05-01-2007
Quote:
Originally Posted by kduffin
Titan is an opensource utility that can be a good initial lockdown for Linux and other systems. They also have a nice page that goes over some of the things the script actually does:
http://www.fish.com/titan/TITAN_linux.html
Cheers,
Keith
This page is not found. might be moved
esham
9 More Discussions You Might Find Interesting
1. Cybersecurity
I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
Discussion started by: GW01
3 Replies
2. UNIX Desktop Questions & Answers
Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level)
Thanks
Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies
3. UNIX Desktop Questions & Answers
Sorry, Unix file security
Thanks (1 Reply)
Discussion started by: DuttO
1 Replies
4. HP-UX
Was wondering if anyone could answer two quick questions... 1) What is the best way to impliment password triviality checking and also checking to make sure a user does not use the same password twice. 2) is there any nice software out there to manage users on multiple machine as far as security... (6 Replies)
Discussion started by: breigner
6 Replies
5. UNIX for Dummies Questions & Answers
Hello, I'm trying to find a Unix documentation about security! I mean I nead something very complex and complete, not just a document about kerberos, a document about securing against atack ... or others like those. I woulde like if exists, a documentation based on levels of security and expanding... (1 Reply)
Discussion started by: octav
1 Replies
6. UNIX for Dummies Questions & Answers
Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually.
Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies
7. UNIX for Dummies Questions & Answers
Hi to all,
Asking which of the Unix and Windows platform is better may sound stupid...!
But may I know what are the major differences between Unix and Windows in terms of security (authentication, access control, and complexity vs simplicit)?
In which ways Unix does better than windows and... (1 Reply)
Discussion started by: heroine
1 Replies
8. HP-UX
Is there anyway to trace where a user has logged in from.
Someone this morning deleted some data but I only have the following info from the last command
cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02)
cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02)
cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies
9. Solaris
Hello Admins,
I just have a curious question on unix passwords...
As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system.....
so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
re(3pm) Perl Programmers Reference Guide re(3pm)
NAME
re - Perl pragma to alter regular expression behaviour
SYNOPSIS
use re 'taint';
($x) = ($^X =~ /^(.*)$/s); # $x is tainted here
$pat = '(?{ $foo = 1 })';
use re 'eval';
/foo${pat}bar/; # won't fail (when not under -T switch)
{
no re 'taint'; # the default
($x) = ($^X =~ /^(.*)$/s); # $x is not tainted here
no re 'eval'; # the default
/foo${pat}bar/; # disallowed (with or without -T switch)
}
use re 'debug'; # NOT lexically scoped (as others are)
/^(.*)$/s; # output debugging info during
# compile and run time
use re 'debugcolor'; # same as 'debug', but with colored output
...
(We use $^X in these examples because it's tainted by default.)
DESCRIPTION
When "use re 'taint'" is in effect, and a tainted string is the target of a regex, the regex memories (or values returned by the m// opera-
tor in list context) are tainted. This feature is useful when regex operations on tainted data aren't meant to extract safe substrings,
but to perform other transformations.
When "use re 'eval'" is in effect, a regex is allowed to contain "(?{ ... })" zero-width assertions even if regular expression contains
variable interpolation. That is normally disallowed, since it is a potential security risk. Note that this pragma is ignored when the
regular expression is obtained from tainted data, i.e. evaluation is always disallowed with tainted regular expresssions. See "(?{ code
})" in perlre.
For the purpose of this pragma, interpolation of precompiled regular expressions (i.e., the result of "qr//") is not considered variable
interpolation. Thus:
/foo${pat}bar/
is allowed if $pat is a precompiled regular expression, even if $pat contains "(?{ ... })" assertions.
When "use re 'debug'" is in effect, perl emits debugging messages when compiling and using regular expressions. The output is the same as
that obtained by running a "-DDEBUGGING"-enabled perl interpreter with the -Dr switch. It may be quite voluminous depending on the complex-
ity of the match. Using "debugcolor" instead of "debug" enables a form of output that can be used to get a colorful display on terminals
that understand termcap color sequences. Set $ENV{PERL_RE_TC} to a comma-separated list of "termcap" properties to use for highlighting
strings on/off, pre-point part on/off. See "Debugging regular expressions" in perldebug for additional info.
The directive "use re 'debug'" is not lexically scoped, as the other directives are. It has both compile-time and run-time effects.
See "Pragmatic Modules" in perlmodlib.
perl v5.8.0 2002-06-01 re(3pm)