Sponsored Content
Full Discussion: Solaris + viruses
Operating Systems Solaris Solaris + viruses Post 302357266 by solaris_user on Tuesday 29th of September 2009 08:44:08 AM
Old 09-29-2009
Solaris + viruses

I know that UNIX is almost untouchable but my server is slower than previous days .
I found out that some users have watched porn on net , could they compromised system security .

So I have 2 questions

1. Has on market any viruses for Solaris

2. How to block some internet sites under Solaris
 

6 More Discussions You Might Find Interesting

1. Cybersecurity

Fed up of Viruses

I am fed up of getting viruses on my computer. They come from other computers on the network and I'm fed up with them. Can anyone reccomend some virus scanning software or something that I can use to prevent my machine from getting viruses? Thanks (3 Replies)
Discussion started by: jacx2
3 Replies

2. Cybersecurity

Viruses in downloads/webs

How secure are downloads from unix.com, linux.com, etc? Not talking about off the wall individual user sites, but sites like unix.com, download.com, tucows.com? We've been inundated at work lately from viruses, and I want to make sure that for things like work related downloads, that those kind... (5 Replies)
Discussion started by: kymberm
5 Replies

3. Windows & DOS: Issues & Discussions

Viruses sneeking through MS-DOS?

I had just recently experienced, a bad experience... Apperently, a worm got into my computer a created itself in my MS-DOS. No serious damage was done, but I did a little study on it, through my computer. The virus got thought my scan, by coding itself as an HTML file. Don't know why it did that,... (2 Replies)
Discussion started by: hdk_mkr
2 Replies

4. UNIX for Dummies Questions & Answers

Why no Viruses in Unix

Can anyone explain why generally there are no viruses in Unix. Do any of the big Anti Virus supplier produce anything for Unix platforms ? (1 Reply)
Discussion started by: jimthompson
1 Replies

5. Linux

i want to install linux on my computer, but worried about viruses

hi guys, I am new to linux. I want to install it on my home computer. I have a few questions. 1) if an exploit is found on linux, how long is it before it gets patched up? My worry is that because there are not many linux users, if a big is found, then it will be a long time before others... (4 Replies)
Discussion started by: JamesByars
4 Replies

6. Shell Programming and Scripting

Anti-malicious files and viruses

Hello I ask you how to make a Anti-malicious files and viruses Or if one of you a small example of the work on the same place and I hope my request I want a small patch or the process of examination Virus http://www.google.jo/images/cleardot.gif ---------- Post updated... (1 Reply)
Discussion started by: x-zer0
1 Replies
ad(5)							Standards, Environments, and Macros						     ad(5)

NAME
ad - Active Directory as a naming repository DESCRIPTION
Solaris clients can obtain naming information from Active Directory (AD) servers. The Solaris system must first join an AD domain and then add the ad keyword to the appropriate entries in the nsswitch.conf(4) file. The Solaris system joins the AD domain by using the kclient(1M) utility. The AD name service only supports the naming databases for passwd and group. Windows users are not able to log in. The user_attr(4) database has no entries for Windows users, and the passwd(1) command does not sup- port the synchronization of user passwords with AD. The Solaris AD client uses auto-discovery techniques to find AD directory servers, such as domain controllers and global catalog servers. The client also uses the LDAP v3 protocol to access naming information from AD servers. The AD server schema requires no modification because the AD client works with native AD schema. The Solaris AD client uses the idmap(1M) service to map between Windows security identi- fiers (SIDs) and Solaris user identifiers (UIDs) and group identifiers (GIDs). User names and group names are taken from the sAMAccountName attribute of the AD user and group objects and then tagged with the domain where the objects reside. The domain name is separated from the user name or group name by the @ character. The client uses the SASL/GSSAPI/KRB5 security model. The kclient utility is used to join the client to AD. During the join operation, kclient configures Kerberos v5 on the client. See kclient(1M). FILES
/etc/nsswitch.conf Configuration file for the name-service switch. /etc/nsswitch.ad Sample configuration file for the name-service switch configured with ad, dns and files. /usr/lib/nss_ad.so.1 Name service switch module for AD. SEE ALSO
passwd(1), svcs(1), idmap(1M), idmapd(1M), kclient(1M), svcadm(1M), svccfg(1M), svccfg(1M), nsswitch.conf(4), user_attr(4), smf(5) SunOS 5.11 22 Oct 2008 ad(5)
All times are GMT -4. The time now is 11:02 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy