Sponsored Content
Full Discussion: HP 11i 64
Operating Systems HP-UX HP 11i 64 Post 302080370 by aribault on Tuesday 18th of July 2006 03:59:39 AM
Old 07-18-2006
HP 11i 64

Hi,
could somebody confirm that HP 11i 64 is a 64 bits system ?
Thank you
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

hp-ux 11i

Need to find the changes made in hp-ux11iv2 and how to migrate from hp-ux11i to hp-ux11iv2. Thanks in advance. (1 Reply)
Discussion started by: mhbd
1 Replies

2. HP-UX

HP-UX 11i

Need to find the changes made in hp-ux11iv2 and how to migrate from hp-ux11i to hp-ux11iv2. Thanks in advance. (1 Reply)
Discussion started by: mhbd
1 Replies

3. HP-UX

HP-UX 11i v2 for PA-RISC

Hello, i trying to get HP-UX 11i v2 for PA-RISC. I`im to poor to buy this system, so I`am asking that someone can help me. best regards email removed (1 Reply)
Discussion started by: mruczas
1 Replies

4. HP-UX

How to use CSTM on HP-Ux 11i V2

Hi, Newbie here......I am an new guy on HP-Ux... may i ask all the the guru's and who has eperienced here to enlightened me on how to use the CSTM command. My goal is to view the current HW installed on the Server. Thanks in advance. (1 Reply)
Discussion started by: renobal
1 Replies

5. HP-UX

reducing /usr HP-UX 11i

Hi, I've entered the HP-UX 11i server in single user mode, and increased the filesystem /usr by mistake using lvextend -l 3092 /dev/vg00/lvol7 extendfs /dev/vg00/rlvol7 I put small letter "l" instead of "L". and as a result of this mistake the /usr take all the free space in the volume... (2 Replies)
Discussion started by: elshamy_s
2 Replies

6. HP-UX

About compatibility of HP-UX 11i

Could you please tell me if Informix 7.20 UD2 works on HP-UX 11i and if applications that works on HP-UX 10.20 and Informix 7.20 UD2 works on HP-UX 11i. Thanks a lot. (0 Replies)
Discussion started by: Irene Martínez
0 Replies

7. HP-UX

HP UX 11i and HP C8000

Hey, i want install HP UX 11i on HP C8000. When i start the C8000 i get a prompt. On this Prompt i write BOot P1 P1 is my DVD-ROM (IDE). I get the Message "ERROR: Not a boot path". When i write SEArch the Prompt said: P0 scsiA.6 HP73.4MAT3073NP P1 ide.1 ... (2 Replies)
Discussion started by: numx
2 Replies

8. HP-UX

Installing HP 11i v3

Hi, I want to install HP 11i v3 OS on PA-RISC systems, which already have HP11i v1 operating system. I want to know that what are software and hardware requirements I will need for doing this? Thanks in Advance Mike (1 Reply)
Discussion started by: Mike1234
1 Replies

9. HP-UX

Where can i get hp-ux 11i v3

I have to access to hp integrity bl870c server blade and i have no hp-ux 11i v2 or 11i v3 DVD's where can i get a DVD or download it . as i have no direct contact with vendor . thanks (4 Replies)
Discussion started by: h@foorsa.biz
4 Replies

10. HP-UX

Eclipse 3.1 on HP-UX 11i

Hey guys how do you run eclipse on HP-UX 11i? there's a startup.jar and an eclipse file ( which is not an executable ) I get different errors try to run the jar file with different java versions. I have all the possible java vm's installed. (0 Replies)
Discussion started by: binary0x01
0 Replies
WPA_BACKGROUND(8)														 WPA_BACKGROUND(8)

NAME
       wpa_background - Background information on Wi-Fi Protected Access and IEEE 802.11i

WPA
       The  original  security mechanism of IEEE 802.11 standard was not designed to be strong and has proven to be insufficient for most networks
       that require some kind of security. Task group I (Security) of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked to address
       the  flaws  of the base standard and has in practice completed its work in May 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard
       was approved in June 2004 and published in July 2004.

       Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the IEEE 802.11i work (draft  3.0)  to  define  a  subset  of  the  security
       enhancements  that  can	be implemented with existing wlan hardware. This is called Wi-Fi Protected Access<TM> (WPA). This has now become a
       mandatory component of interoperability testing and certification done by Wi-Fi Alliance. Wi-Fi provides information about WPA at  its  web
       site (http://www.wi-fi.org/OpenSection/protected_access.asp).

       IEEE  802.11  standard  defined	wired  equivalent privacy (WEP) algorithm for protecting wireless networks. WEP uses RC4 with 40-bit keys,
       24-bit initialization vector (IV), and CRC32 to protect against packet forgery. All these choices have proven to be insufficient: key space
       is too small against current attacks, RC4 key scheduling is insufficient (beginning of the pseudorandom stream should be skipped), IV space
       is too small and IV reuse makes attacks easier, there is no replay protection, and non-keyed authentication does not  protect  against  bit
       flipping packet data.

       WPA  is	an intermediate solution for the security issues. It uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a compro-
       mise on strong security and possibility to use existing hardware. It still uses RC4 for the encryption like WEP, but  with  per-packet  RC4
       keys. In addition, it implements replay protection, keyed packet authentication mechanism (Michael MIC).

       Keys  can  be managed using two different mechanisms. WPA can either use an external authentication server (e.g., RADIUS) and EAP just like
       IEEE 802.1X is using or pre-shared keys without need for additional servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal", respec-
       tively. Both mechanisms will generate a master session key for the Authenticator (AP) and Supplicant (client station).

       WPA implements a new key handshake (4-Way Handshake and Group Key Handshake) for generating and exchanging data encryption keys between the
       Authenticator and Supplicant. This handshake is also used to verify that both Authenticator and Supplicant know	the  master  session  key.
       These  handshakes  are  identical  regardless  of  the selected key management mechanism (only the method for generating master session key
       changes).

IEEE 802.11I / WPA2
       The design for parts of IEEE 802.11i that were not included in WPA has finished (May 2004) and this amendment to IEEE 802.11  was  approved
       in  June  2004.	Wi-Fi  Alliance is using the final IEEE 802.11i as a new version of WPA called WPA2. This includes, e.g., support for more
       robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) to replace TKIP and optimizations for handoff (reduced number of  mes-
       sages in initial key handshake, pre-authentication, and PMKSA caching).

SEE ALSO
       wpa_supplicant(8)

LEGAL
       wpa_supplicant is copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> and contributors.  All Rights Reserved.

       This program is dual-licensed under both the GPL version 2 and BSD license. Either license may be used at your option.

								 07 November 2012						 WPA_BACKGROUND(8)
All times are GMT -4. The time now is 04:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy