Sponsored Content
Operating Systems HP-UX minimum hardware requirement for HPUX 11i V3 Post 302321102 by hqghu1 on Saturday 30th of May 2009 05:48:45 AM
Old 05-30-2009
Quote:
Originally Posted by girish.batra

Could any one tell me that HPUX 11i v1 or v2 can be installed or not on this workstation

Kind Regards
HPUX 11i v2 works on b2000 (with 1GB of RAM). Of course it is unsupported... I've also tried to boot v3 but without any success Smilie. I think the problem is with backward hardware compatibility - drivers for old hardware (in that case b2000's memory subsystem) may have been removed.

Regards
 

10 More Discussions You Might Find Interesting

1. HP-UX

is nedit available in hpux 11i version 2?

hi 1).in the command "set" result, the 2nd line is EDITOR=vi is it means the vi editor is the default editor? 2). is "nedit"editor available in hpux 11iv2? if no how to install or work in nedit in hpux 11i? (0 Replies)
Discussion started by: sekar sundaram
0 Replies

2. HP-UX

HPUX Hardware commands.

HI ALL, I am new tp HPUX and i am looking for command that will retive me the following information on HPUX: Chassis Name & Serial Number: Monitor Name BIOS Name EthernetPort Name IPEndpoint Name PointingDevice Name Keyboard NetworkPrinter Name LocalPrinter (5 Replies)
Discussion started by: Veenak15
5 Replies

3. HP-UX

backspace deletion hpux 11i

how i can enable backspace or charector deletion in hpux11i shell prompt. (12 Replies)
Discussion started by: jestinabel
12 Replies

4. UNIX for Advanced & Expert Users

ksh read bug in HPUX 11i

Is this a bug in ksh on HPUX 11i or is read impromperly documented? INPUT Thu Jan 18 09:14:52 PST : CIFS: Virus Detected - File ONTAP_ADMIN$\vol\vol0\DDD\Ventana\Strattoni\Race Stuff\Rumor.exe in share DDD accessed by client CLIENT (111.11.11.111) running as user USER is infected. The filer... (3 Replies)
Discussion started by: Jackaroe
3 Replies

5. HP-UX

pstat_getdisk() call doesn’t work properly in HPUX 11.31 (11i V3)

As per the man page, pstat_getdisk() call returns the number of instances, which could be 0 upon successful completion, otherwise a value of -1 is returned. Please have a look at this sample program -> #include <stdio.h> #include <sys/pstat.h> int main() { int j = 0, ret; struct... (2 Replies)
Discussion started by: sandiworld
2 Replies

6. Solaris

Solaris 10 Minimum Sys Requirement

HI all, What the minimum & recommended system requirement for Rhel Linux to get install on it??:( Plz reply ASAp (0 Replies)
Discussion started by: saurabh84g
0 Replies

7. HP-UX

Minimum Sys Requirement

HI all, What the minimum & recommended system requirement for Rhel Linux to get install on it??:( Plz reply ASAp (0 Replies)
Discussion started by: saurabh84g
0 Replies

8. AIX

Minimum System Requirement

HI all, What the minimum & recommended system requirement for IBM AIX to get install on it?? Plz Reply ASAP. (3 Replies)
Discussion started by: saurabh84g
3 Replies

9. Shell Programming and Scripting

remove strings of lowercase characters (with minimum length requirement)

Hi all, I want to delete all lowercase characters from my file, but only strings of length 7 and more. For example, how can I go from: JHGEFigeIGDUIirfyfiyhgfoiyfKJHGuioyrDHG To: JHGEFigeIGDUIKJHGuioyrDHG There should be a trick to add to sed 's///g', but I can't figure it out.... (2 Replies)
Discussion started by: elbuzzo
2 Replies

10. HP-UX

Status of hardware in HpUx

We would like to know a HP Utility or any Unix command that can give the exact status of PCI Gigabit Ethernet cable (lan cable) We had tried to execute lanscan ioscan -fnC lan The status appears to be the same when the cable is plugged & unplugged and also when the lan is disabled &... (5 Replies)
Discussion started by: siva3492
5 Replies
WPA_BACKGROUND(8)														 WPA_BACKGROUND(8)

NAME
wpa_background - Background information on Wi-Fi Protected Access and IEEE 802.11i WPA
The original security mechanism of IEEE 802.11 standard was not designed to be strong and has proven to be insufficient for most networks that require some kind of security. Task group I (Security) of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked to address the flaws of the base standard and has in practice completed its work in May 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was approved in June 2004 and published in July 2004. Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the IEEE 802.11i work (draft 3.0) to define a subset of the security enhancements that can be implemented with existing wlan hardware. This is called Wi-Fi Protected Access<TM> (WPA). This has now become a mandatory component of interoperability testing and certification done by Wi-Fi Alliance. Wi-Fi provides information about WPA at its web site (http://www.wi-fi.org/OpenSection/protected_access.asp). IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm for protecting wireless networks. WEP uses RC4 with 40-bit keys, 24-bit initialization vector (IV), and CRC32 to protect against packet forgery. All these choices have proven to be insufficient: key space is too small against current attacks, RC4 key scheduling is insufficient (beginning of the pseudorandom stream should be skipped), IV space is too small and IV reuse makes attacks easier, there is no replay protection, and non-keyed authentication does not protect against bit flipping packet data. WPA is an intermediate solution for the security issues. It uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a compro- mise on strong security and possibility to use existing hardware. It still uses RC4 for the encryption like WEP, but with per-packet RC4 keys. In addition, it implements replay protection, keyed packet authentication mechanism (Michael MIC). Keys can be managed using two different mechanisms. WPA can either use an external authentication server (e.g., RADIUS) and EAP just like IEEE 802.1X is using or pre-shared keys without need for additional servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal", respec- tively. Both mechanisms will generate a master session key for the Authenticator (AP) and Supplicant (client station). WPA implements a new key handshake (4-Way Handshake and Group Key Handshake) for generating and exchanging data encryption keys between the Authenticator and Supplicant. This handshake is also used to verify that both Authenticator and Supplicant know the master session key. These handshakes are identical regardless of the selected key management mechanism (only the method for generating master session key changes). IEEE 802.11I / WPA2 The design for parts of IEEE 802.11i that were not included in WPA has finished (May 2004) and this amendment to IEEE 802.11 was approved in June 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new version of WPA called WPA2. This includes, e.g., support for more robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) to replace TKIP and optimizations for handoff (reduced number of mes- sages in initial key handshake, pre-authentication, and PMKSA caching). SEE ALSO
wpa_supplicant(8) LEGAL
wpa_supplicant is copyright (c) 2003-2012, Jouni Malinen <j@w1.fi> and contributors. All Rights Reserved. This program is licensed under the BSD license (the one with advertisement clause removed). 09 June 2014 WPA_BACKGROUND(8)
All times are GMT -4. The time now is 05:28 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy