Sponsored Content
Full Discussion: protect dtterm
Top Forums UNIX for Dummies Questions & Answers protect dtterm Post 16099 by inquirer on Monday 25th of February 2002 08:03:34 PM
Old 02-25-2002
Lightbulb protect dtterm

we have an hp-ux and a user requested me if i can password protect the dtterm. i know that this is possible but can you give me some hints in making this happen?

thanks Smilie
inquirer
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

activating ./dtterm

Working of a Aix 4.3 (using ksh) Have started dtlogin daemon . < root 26376 1 0 14:07:19 - 0:08 ./dtlogin -daemon > Have set dtconfig -e < The CDE environment is Already set as the default User Interface. > Have executed " export DISPLAY=10.1.187.86:0.0 Once all this is... (4 Replies)
Discussion started by: buRst
4 Replies

2. Solaris

spawning new shells using dtterm in Solaris 8

Hi all, First time poster here. Great forum. Im trying to spawn new shells and pass commands to the new shells in a solaris 8 environment utilizing dtterm and its option -e. I can successfully spawn a window utilizing the following code: /usr/dt/bin/dtterm -display <ip.address> & ... (4 Replies)
Discussion started by: Rocketman8541
4 Replies

3. UNIX for Advanced & Expert Users

Protect from rm /

We recently had an accidental delete from /. I hold the root password but others are allowed to sudo over to root to perform admin tasks. The only way I want to permit deletion from / is by physically being root (su -). I'd like to add a line to the sudoers file which would permit all commands... (1 Reply)
Discussion started by: scottsl
1 Replies

4. UNIX for Advanced & Expert Users

Changing text color in existing xterm or dtterm

On solaris and irix systems, I'm using csh in an existing xterm or dterm and would like to change the text colors. How do I accomplish this? Thanks (1 Reply)
Discussion started by: fjc
1 Replies

5. Red Hat

Caps lock dtterm

Hello, We are having a problem with running dtterm off a RHEL server. Logging into an HP-UX server from a RHEL 5.1 desktop, setting DISPLAY and running dtterm, the caps lock does not work. We have been playing with xmodmap & stty but to no avail. Any help appreciated. mgb (1 Reply)
Discussion started by: mgb
1 Replies

6. HP-UX

Caps lock dtterm

Hello, We are having a problem with running dtterm off a RHEL server. Logging into an HP-UX server from a RHEL 5.1 desktop, setting DISPLAY and running dtterm, the caps lock does not work. We have been playing with xmodmap & stty but to no avail. Any help appreciated. mgb (7 Replies)
Discussion started by: mgb
7 Replies

7. Solaris

launching an automated telnet session using dtterm

Hi , I have to write a shell script which would be invoked from a Java program. The job of this script would be to launch a telnet session i was using dtterm for the same and the expect command to automate that. spawn dtterm -e telnet <server ip address> expect "Username:" send... (0 Replies)
Discussion started by: rajeev_solanki
0 Replies

8. UNIX for Advanced & Expert Users

protect process

how to protect my process from others to kill?? Double post, continued here, thread closed (0 Replies)
Discussion started by: samrintu
0 Replies

9. UNIX for Dummies Questions & Answers

dtterm to list a folder contents in new window

Hi everyone,:cool: thank you in advance for any help on this I have a dtterm command to open a new small terminal window with a contents of log, and it works fine. dtterm -title "my.log" -geometry =40x30+0+550 -fn 6x13 -e tail -n 40 -f /home/logs/user.log & However what I want to do... (4 Replies)
Discussion started by: golfcents
4 Replies
ssss(1) 						      General Commands Manual							   ssss(1)

NAME
ssss - Split and Combine Secrets using Shamir's Secret Sharing Scheme. SYNOPSIS
ssss-split -t threshold -n shares [-w token] [-s level] [-x] [-q] [-Q] [-D] [-v] ssss-combine -t threshold [-x] [-q] [-Q] [-D] [-v] DESCRIPTION
ssss is an implementation of Shamir's Secret Sharing Scheme. The program suite does both: the generation of shares for a known secret, and the reconstruction of a secret using user-provided shares. COMMANDS
ssss-split: prompt the user for a secret and generate a set of corresponding shares. ssss-combine: read in a set of shares and reconstruct the secret. OPTIONS
-t threshold Specify the number of shares necessary to reconstruct the secret. -n shares Specify the number of shares to be generated. -w token Text token to name shares in order to avoid confusion in case one utilizes secret sharing to protect several independent secrets. The generated shares are prefixed by these tokens. -s level Enforce the scheme's security level (in bits). This option implies an upper bound for the length of the shared secret (shorter secrets are padded). Only multiples of 8 in the range from 8 to 1024 are allowed. If this option is ommitted (or the value given is 0) the security level is chosen automatically depending on the secret's length. The security level directly determines the length of the shares. -x Hex mode: use hexadecimal digits in place of ASCII characters for I/O. This is useful if one wants to protect binary data, like block cipher keys. -q Quiet mode: disable all unnecessary output. Useful in scripts. -Q Extra quiet mode: like -q, but also suppress warnings. -D Disable the diffusion layer added in version 0.2. This option is needed when shares are combined that where generated with ssss ver- sion 0.1. -v Print version information. EXAMPLE
In case you want to protect your login password with a set of ten shares in such a way that any three of them can reconstruct the password, you simply run the command ssss-split -t 3 -n 10 -w passwd To reconstruct the password pass three of the generated shares (in any order) to ssss-combine -t 3 NOTES
To protect a secret larger than 1024 bits a hybrid technique has to be applied: encrypt the secret with a block cipher and apply secret sharing to just the key. Among others openssl and gpg can do the encryption part: openssl bf -e < file.plain > file.encrypted gpg -c < file.plain > file.encrypted SECURITY
ssss tries to lock its virtual address space into RAM for privacy reasons. But this may fail for two reasons: either the current uid doesn't permit page locking, or the RLIMIT_MEMLOCK is set too low. After printing a warning message ssss will run even without obtaining the desired mlock. AUTHOR
This software (v0.5) was written in 2006 by B. Poettering (ssss AT point-at-infinity.org). Find the newest version of ssss on the project's homepage: http://point-at-infinity.org/ssss/. FURTHER READING
http://en.wikipedia.org/wiki/Secret_sharing Manuals User ssss(1)
All times are GMT -4. The time now is 10:53 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy