02-19-2008
were do you enter the code at to disable it?
8 More Discussions You Might Find Interesting
1. Cybersecurity
About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.
How many... (0 Replies)
Discussion started by: kduffin
0 Replies
2. Virtualization and Cloud Computing
Tim Bass
Thu, 15 Nov 2007 23:55:07 +0000
*I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies
3. AIX
Hi
I have a question with regards to AIX 5.3 & TCB. I have a client that is requesting TCB to be installed in AIX. However it seems that the perception of TCB is that it causes major headaches when it comes to configuring the system in real world environments, such as large scale Oracle... (15 Replies)
Discussion started by: kimyo
15 Replies
4. AIX
Habe folgende Frage an der ich mich schwer tue,
Welche Möglichkeiten bietet IBM's Betriebssystem "AIX" hinsichtlich der Ausbildung einer TCB-Umgebung?
vielen Dank (6 Replies)
Discussion started by: Invisibleye86
6 Replies
5. Linux
Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies
6. Red Hat
Hello,
What is the simplest way to install CentOS 6.1 with console base-system only using official LiveDVD image on VirtualBox machine? I'd like to get simplest console with network support like FreeBSD base installation. Then, install services which I need.
The installer jest extracts the... (2 Replies)
Discussion started by: newbie_develope
2 Replies
7. AIX
Hi,
I've verified my AIX 7.1 LPAR , and TCB is disabled by default.
#odmget -q attribute=TCB_STATE PdAt
PdAt:
uniquetype = ""
attribute = "TCB_STATE"
deflt = "tcb_disabled"
values = ""
width = ""
type = ""
generic = ""
... (3 Replies)
Discussion started by: System Admin 77
3 Replies
8. UNIX for Beginners Questions & Answers
How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies
LEARN ABOUT OPENSOLARIS
trusted_extensions
trusted_extensions(5) Standards, Environments, and Macros trusted_extensions(5)
NAME
trusted_extensions - Solaris Trusted Extensions
DESCRIPTION
SolarisTM Trusted Extensions software is a specific configuration of the Solaris Operating System (Solaris OS). Solaris Trusted Extensions
(Trusted Extensions) provides labels for local objects and processes, for the desktop and windowing system, for zones and file systems, and
for network communications. These labels are used to implement a Multilevel Security (MLS) policy that restricts the flow of information
based on label relationships. In contrast to Discretionary Access Control (DAC) based on ownership, the MLS policy enforced by Trusted
Extensions is an example of Mandatory Access Control (MAC).
By default, Trusted Extensions software is disabled. It is enabled and disabled (but not configured) by the labeld(1M) service, identified
by the FMRI:
svc:/system/labeld:default
Refer to the Administrator's Guide listed below for the required configuration of Trusted Extensions software necessary before use. The
system must be rebooted after enabling or disabling labeld to activate or deactivate Trusted Extensions software.
SEE ALSO
labeld(1M), label_encodings(4), labels(5)
Solaris Trusted Extensions Administrator's Procedures
Solaris Trusted Extensions User's Guide
SunOS 5.11 12 Nov 2007 trusted_extensions(5)