Sponsored Content
Top Forums UNIX for Advanced & Expert Users Any takers on a security issue Post 302297683 by Corona688 on Saturday 14th of March 2009 01:19:34 PM
Old 03-14-2009
Does the machine obtain any network information via DHCP?
 

9 More Discussions You Might Find Interesting

1. Solaris

Solaris 8 security log issue

Hi all, I'm using Solaris 8 right now. Recently I've a task that needs to log down all unsuccessful login to a log for auditing purpose. What steps do I have to take to log down all login failure logs? Do I've to edit a certain file for it or done by the X-window mode? BTW, do I have to... (2 Replies)
Discussion started by: heero
2 Replies

2. Shell Programming and Scripting

Security Issue with Standard Input?

Hi Gang, Running a script in AIX 5.3. Users wanted me to add a "confirm you want to run script, enter 'y' or 'n'" kind of thing... here is what I came up with: #!/bin/sh myfile=`basename "$1"` dateNow=`date "+%m.%d.%Y.%H.%M.%S"` # Get current date mydatedfile=$myfile.$dateNow... (2 Replies)
Discussion started by: yall
2 Replies

3. Web Development

Accessing a Perl CGI script, security issue

Hi Everybody, I was wondering if it was possible for someone to gain access to my Perl CGI scripts before they are interpreted by Perl (mod_perl on apache2) i.e. getting a hold of my raw scripts and not the html output? Let's say I use the DBI module where I have the hostname, user and... (2 Replies)
Discussion started by: z1dane
2 Replies

4. Red Hat

not able to Send mail due to Security Issue

Hi All, I am trying to send a mail from my application through SMTP in solaris 9 but unable to send a mail.Same code is able to send mail in Windows. As unix has more security,So as per me,it is due to security reason.. So please let me know what I need to do to send a mail properly. what... (5 Replies)
Discussion started by: smartgupta
5 Replies

5. UNIX for Dummies Questions & Answers

Security issue and temp files

Hello, One of the senior network admins at work told me that I should not hard code temp files into my scripts. Rather I should use the mktemp commands in the script to create them on the fly. His argument was that if a malicious user knew the name of my temp files in the script they could... (6 Replies)
Discussion started by: mojoman
6 Replies

6. Red Hat

security issue

Hi all, Can someone please help to provide solutions for below security-related Linux server issue? Level : 2 UDP Constant IP Identification Field Fingerprinting Vulnerability Level : 2 TCP Sequence Number Approximation Based Denial of Service Level : 2 Operating System Detected Level : 2... (1 Reply)
Discussion started by: lseowhua
1 Replies

7. Red Hat

Zimbra Mail Server Security Issue

Hello, I have issue with my Zimbra Mail Server 6.0.7. In that i have configured HTTPS for client login and for whole session. but it stills communicate in http based authentication. due to that some sniffing software are easily sniffing details. So how do i configure completely HTTPS in... (3 Replies)
Discussion started by: Chintanghanti
3 Replies

8. UNIX for Beginners Questions & Answers

Finger command and security issue

$ finger yeti Login: yeti Name: yeti Directory: /arpa/tz/y/yeti Shell: /bin/ksh On since Wed Apr 2 15:24 (UTC) on pts/149 Mail last read Mon Mar 31 11:08 2014 (UTC) No Plan. Hi there, I am trying to... (2 Replies)
Discussion started by: alvinoo
2 Replies

9. UNIX for Beginners Questions & Answers

X Windows Security Issue

Hi there, I am trying to understanding the difference between X11, host- based versus user-based access controls. And how vulnerability can the X11 settings be and why it is recommended to turn it off. (1 Reply)
Discussion started by: alvinoo
1 Replies
nodename(4)							   File Formats 						       nodename(4)

NAME
nodename - local source for system name SYNOPSIS
/etc/nodename DESCRIPTION
When a machine is standalone or its IP address is configured locally, the /etc/nodename file contains the system name. By convention, the system name is the same as the hostname associated with the IP address of the primary network interface, for example, hostname.hme0. If the machine's network configuration is delivered by the RPC bootparams protocol, the /etc/nodename file is not used, as the system name is delivered by the remote service. Given a system name value, regardless of source, the uname utility invoked with the -S option is used to set the system name of the running system. If the machine's network configuration is delivered by the DHCP protocol, the /etc/nodename file is used only if the DHCP server does not provide a value for the Hostname option (DHCP standard option code 12). A system name configured in /etc/nodename should be unique within the system's name service domain in order to ensure that any network ser- vices provided by the system will operate correctly. Given a system name value, regardless of source, the uname utility invoked with the -S option is used to set the system name of the running system. EXAMPLES
Example 1: Syntax The syntax for nodename consists of a single line containing the system's name. For example, for a system named myhost: myhost ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ SEE ALSO
nis+(1), uname(1), named(1M), ypbind(1M), attributes(5) NOTES
The nodename file is modified by Solaris installation and de-installation scripts. SunOS 5.10 9 Feb 2004 nodename(4)
All times are GMT -4. The time now is 05:47 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy