Sponsored Content
Full Discussion: HPUX certification
Operating Systems HP-UX HPUX certification Post 302150860 by ranjith81 on Wednesday 12th of December 2007 11:26:32 PM
Old 12-13-2007
So the new certification is for 11i v1 or v2
 

10 More Discussions You Might Find Interesting

1. Cybersecurity

Certification

are there any unix certification's on security, and which is the most best one to take? (2 Replies)
Discussion started by: lealyz
2 Replies

2. Programming

C Certification

I would like to become certified in C/C++ and UNIX. Can anyone assist by giving links or details of the best track I could take. (1 Reply)
Discussion started by: Lucky Luke
1 Replies

3. AIX

Certification

Hi, I know this may not be the right place to put this but i wanted to know if there is any AIX certification avialable or something similar . Or is there any general Unix certification . TIA Anubha (1 Reply)
Discussion started by: asinha63
1 Replies

4. UNIX for Advanced & Expert Users

Certification

Hi I know Shell, AWK, SED, I am looking for some Certification Red Hat or any other recoginsed one. I dont want to go into Networking I want to remain as Developer...So Can you help me in knowing what kind of Certifications are avaible. Links, PDF's, etc are most welcomed. Thanks in... (3 Replies)
Discussion started by: niceboykunal123
3 Replies

5. Shell Programming and Scripting

Need Script to Use CPUs on a HPUX server to simulate Workload Manager on HPUX.

I am running HPUX and using WLM (workload manager). I want to write a script to fork CPUs to basically take CPUs from other servers to show that the communication is working and CPU licensing is working. Basically, I want to build a script that will use up CPU on a server. Any ideas? (2 Replies)
Discussion started by: cpolikowsky
2 Replies

6. UNIX for Dummies Questions & Answers

Which certification

I'm learning UNIX on my Mac (BSD) and quite like it. I'm a newbie, but I think I'd like to eventually find some work with UNIX/LINUX. But I'm not sure where to begin -- there are so many versions and job options, it's kind of overwhelming. A friend suggested learning Debian to start out with... (3 Replies)
Discussion started by: Straitsfan
3 Replies

7. HP-UX

pwage-hpux-T for Trusted HPUX servers

I'm sharing this in case anybody needs it. Modified from the original solaris pwage script. This modified hpux script will check /etc/password file on hpux trusted systems search /tcb and grep the required u_succhg field. Calculate days to expiry and notify users via email. original solaris... (2 Replies)
Discussion started by: sparcguy
2 Replies

8. Shell Programming and Scripting

Certification course

Good afternnon i've got a question: Does anybody know if there is a course or link that i can take and then take a good and qualified certification course related to unix programim¡ng and scripting ? Id appreciate your help in advanced ---------- Post updated at 01:56 PM ----------... (1 Reply)
Discussion started by: alexcol
1 Replies

9. HP-UX

HP-UX certification

Hi, In my current organist I am using HP-UX. I would like to get certified in UNIX but i am not sure for which certification i should go. I am thinking of either Solaris or HP-UX. Please guide me which would be better for me? And also let me what study materials should i use and the Fees... (3 Replies)
Discussion started by: ManishV
3 Replies

10. What is on Your Mind?

The Benefits or Not of Certification (was LPIC certification)

Hi guys, What do you think about these certifications? (18 Replies)
Discussion started by: Luca.Francesca
18 Replies
WPA_BACKGROUND(8)														 WPA_BACKGROUND(8)

NAME
wpa_background - Background information on Wi-Fi Protected Access and IEEE 802.11i WPA
The original security mechanism of IEEE 802.11 standard was not designed to be strong and has proven to be insufficient for most networks that require some kind of security. Task group I (Security) of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked to address the flaws of the base standard and has in practice completed its work in May 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was approved in June 2004 and published in July 2004. Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the IEEE 802.11i work (draft 3.0) to define a subset of the security enhancements that can be implemented with existing wlan hardware. This is called Wi-Fi Protected Access<TM> (WPA). This has now become a mandatory component of interoperability testing and certification done by Wi-Fi Alliance. Wi-Fi provides information about WPA at its web site (http://www.wi-fi.org/OpenSection/protected_access.asp). IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm for protecting wireless networks. WEP uses RC4 with 40-bit keys, 24-bit initialization vector (IV), and CRC32 to protect against packet forgery. All these choices have proven to be insufficient: key space is too small against current attacks, RC4 key scheduling is insufficient (beginning of the pseudorandom stream should be skipped), IV space is too small and IV reuse makes attacks easier, there is no replay protection, and non-keyed authentication does not protect against bit flipping packet data. WPA is an intermediate solution for the security issues. It uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a compro- mise on strong security and possibility to use existing hardware. It still uses RC4 for the encryption like WEP, but with per-packet RC4 keys. In addition, it implements replay protection, keyed packet authentication mechanism (Michael MIC). Keys can be managed using two different mechanisms. WPA can either use an external authentication server (e.g., RADIUS) and EAP just like IEEE 802.1X is using or pre-shared keys without need for additional servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal", respec- tively. Both mechanisms will generate a master session key for the Authenticator (AP) and Supplicant (client station). WPA implements a new key handshake (4-Way Handshake and Group Key Handshake) for generating and exchanging data encryption keys between the Authenticator and Supplicant. This handshake is also used to verify that both Authenticator and Supplicant know the master session key. These handshakes are identical regardless of the selected key management mechanism (only the method for generating master session key changes). IEEE 802.11I / WPA2 The design for parts of IEEE 802.11i that were not included in WPA has finished (May 2004) and this amendment to IEEE 802.11 was approved in June 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new version of WPA called WPA2. This includes, e.g., support for more robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) to replace TKIP and optimizations for handoff (reduced number of mes- sages in initial key handshake, pre-authentication, and PMKSA caching). SEE ALSO
wpa_supplicant(8) LEGAL
wpa_supplicant is copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> and contributors. All Rights Reserved. This program is dual-licensed under both the GPL version 2 and BSD license. Either license may be used at your option. 07 November 2012 WPA_BACKGROUND(8)
All times are GMT -4. The time now is 06:55 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy