Sponsored Content
Full Discussion: how unix called as secure
Top Forums UNIX for Dummies Questions & Answers how unix called as secure Post 302121769 by sysgate on Monday 18th of June 2007 08:57:06 AM
Old 06-18-2007
I answered this "question" in the other thread, also, refrain from double / cross post, actually, just read the rules.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how can i secure the unix box?

i am new to the unix i am running solaris 9 i like it better than windows... anyway i am looking on how can i secure the box in terms of software any freedownloads would be a plus as well.... also what commands will be useful to see if there has been a security breech on the unix box? ... (1 Reply)
Discussion started by: rmuhammad
1 Replies

2. Shell Programming and Scripting

how to use SCP (secure copy) in UNIX

i have to transfer a file from one server to another. say, my script is running on server 'A' and one file has to be transferred from server 'A' to server 'B' using SCP. i am using it as: sourceserverA> scp -P <port> userid@serverBhostname:/put/this/here <sourcefile path> but it is giving... (1 Reply)
Discussion started by: dharmesht
1 Replies

3. SCO

Identifiy and Kill Idle Unix(SCO) Process called externally

Hi, Please let us know of any possiblity of identifying and killing unix proces invoked externally (by an external tool which does not create a session). 'who' command gives idle time of sessions. But what we are looking for is idle time of a process. 'ps' command gives the elapsed/running... (1 Reply)
Discussion started by: vbalajis
1 Replies

4. UNIX for Dummies Questions & Answers

Secure Remote Unix Shutdown

I am wondering if it is possible to shut down a unix machine using a windows NT based machine. I would like the process to be secure, like logging into root using SSL or something simular and then running a shutdown command. Thnaks, Eternal (2 Replies)
Discussion started by: Eternalaop
2 Replies

5. UNIX for Advanced & Expert Users

difference between logging into unix through f-secure ssh client and telnet

hi, what is the difference between logging into unix through f-secure ssh client and telnet is there any more security check is involved can any one explain thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies

6. UNIX for Dummies Questions & Answers

Secure Chat program for UNIX

I am wanting to know if you have ever found an extremely secure chat program for UNIX (Solaris 7), such that I could control which users can chat with which users, ie John (teacher) can talk to Suzy (student) or Sam (student) and they can talk back to their teacher BUT there is absolutely ... (1 Reply)
Discussion started by: ixeye
1 Replies

7. UNIX for Advanced & Expert Users

Unix more secure than windows

Hi, I need to know why is Unix considered as more secure as compared to Windows. Following points are known but the reason is not known: i. File access permissions can be provided user wise in unix. .....but if i share my file in windows, then on that also access permissions can be... (10 Replies)
Discussion started by: rajneesh_kapoor
10 Replies

8. Cybersecurity

Secure Laptop composition with UNIX/Linux and Windows 7

Hello I have a problem: want to build secure laptop for simple user ( that's me :D ) with the VPN and virtualization. Laptop would be for work at home and travel , so security for wirelles networks and comfort using Mobile 3G internet with dongle (not to have problem with drivers) is also... (1 Reply)
Discussion started by: edgkkk
1 Replies

9. Programming

Secure FTP from Windows to UNIX

Looking for a way to secure ftp files from Windows to Unix through batch script. This may not be related to Unix/Linux environment, but hoping some solution. Our desktop (Win 7) does not have sftp installed in our machine (DOS-Command Window). We have SSH tools like Winscp, PSFTP (PuTTY),... (4 Replies)
Discussion started by: bobbygsk
4 Replies

10. Programming

Remote login UNIX box from java passing parameters to the custom script called in the profile

Hello Good Day / Guten Tag.... I have to login the server and the user profile contains some scripts which need the inputs to be taken from the keyboard. So I use the method to conn.authenticateWithKeyboardInteractive(username, new InteractiveCallback() { public String... (1 Reply)
Discussion started by: Sanalkumaran
1 Replies
UML_SWITCH(1)						      General Commands Manual						     UML_SWITCH(1)

NAME
uml_switch -- switch daemon for user-mode Linux SYNOPSIS
uml_switch [-unix control_socket data_socket] [-hub] [-tap tun device] [-compat-v0] [-daemon] DESCRIPTION
This manual page documents briefly the uml_switch program. This manual page was written for the Debian GNU/Linux distribution because the original program does not have a manual page. uml_switch is a daemon for managing a virtual network between user-mode Linux systems, with no connection to the host system's network. It will listen for connections on a pair of UNIX domain sockets, and forward packets between clients which connect to them. OPTIONS
-unix control_socket data_socket Listen on the specified pair of sockets, instead of the defaults. -hub Act like a hub. This means that packets received will be broadcast over all virtual links. The default is to act as a switch, where packets are only sent to the link matching the destination MAC address of the packet. -tap tap device Connect the switch to a dynamically created tap device on the host -compat-v0 Specify control protocol version 0 compatibility. -daemon Run in the background as a daemon. SEE ALSO
linux(1) The UserModeLinux-HOWTO (link to URL http://user-mode-linux.sourceforge.net/UserModeLinux-HOWTO.html) AUTHOR
uml_switch was written by Jeff Dike and others. This manual page was written by Matt Zimmerman mdz@debian.org for the Debian GNU/Linux system (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts. UML_SWITCH(1)
All times are GMT -4. The time now is 09:49 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy