Sponsored Content
Full Discussion: Solaris Trusted Extension ?
Operating Systems Solaris Solaris Trusted Extension ? Post 302368550 by fugitive on Thursday 5th of November 2009 04:13:39 AM
Old 11-05-2009
So isn't there any way to check if the trusted extensions are configured on my system or not ?
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

PAM Vs Trusted mode in HP-UX

Hi All, Some questions on PAM (Pluggable Authentication Modulues) and Trusted mode in HP-UX. As default, when I turn on trusted mode (need shadow password only), the PAM is atomatically installed(not sure the word "installed" is appropriate or not). Can we turn on the trusted mode only,... (0 Replies)
Discussion started by: wilsonchan1000
0 Replies

2. UNIX for Dummies Questions & Answers

NIS+ and trusted hosts

Hello there, Can someone tell me if you need to make the hosts trusted hosts if you use NIS+? Thanks, E (2 Replies)
Discussion started by: eknaap
2 Replies

3. Cybersecurity

Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work. How many... (0 Replies)
Discussion started by: kduffin
0 Replies

4. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies

5. Solaris

execute in exec_attr in Solaris 10 w/ Trusted Extensions

How do I get this line to execute in exec_attr in Solaris 10 with Trusted Extensions? It needs to run as 'sh cpu_root.sh' With the 'sh' it won't execute. Oracle_Install:solaris:cmd:::/cots/oracle/patches/CPUJan2009/9999999/sh cpu_root.sh:uid=0;gid=0 -----Post Update----- Or... (1 Reply)
Discussion started by: djehres
1 Replies

6. Solaris

projects in Solaris 10 w/ Trusted Extensions

Is there a Solaris 10 BUG (with Trusted Extensions) with binding to a project? This is Solaris 10 32bit Intel and Oracle EE 10gRel2. I am being told that a project (/etc/project) will not bind to the user because of a Solaris bug. According to my admin people Solaris told my company this when... (2 Replies)
Discussion started by: djehresmann
2 Replies

7. Solaris

Solaris image file extension

Hi! I've been wondering what is the file extension for an image file in Solaris. For Windows, I know it's .jpeg or .bmp or .png and etc. What do Solaris call their image file extensions then? I just know how to make a file by the use of this command: # mkfile 1000k /dev/rdsk/c7t0d0s0 ... (6 Replies)
Discussion started by: arah
6 Replies

8. UNIX for Dummies Questions & Answers

Display the .csv extension files based on .done extension fine

Hi All, I want to fetch the files based on .done file and display the .csv files and Wil take .csv files for processing. 1.I need to display the .done files from the directory. 2.next i need to search for the .Csv files based on .done file.then move .csv files for the one directory ... (2 Replies)
Discussion started by: girija.g6
2 Replies

9. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies
CHECKSECURITY(8)					      System Manager's Manual						  CHECKSECURITY(8)

NAME
checksecurity - Run a collection of simple system checks SYNOPSIS
checksecurity DESCRIPTION
The checksecurity command runs a small collection of simple system checks which are designed to catch a few common security issues. check- security is run by cron in a daily basis. CONFIGURATION
The checksecurity.conf file defines several configuration variables: MAILTO, CHECK_DISKFREE, CHECK_PASSWD and CHECK_SETUID LOGDIR. Each is described below. The checksecurity program works with a collection of plugins which are located in /usr/share/checksecurity and are configured individually by their own configuration file. CHECK_PASSWD If this is set to TRUE then the check-passwd script will be invoked. This script is designed to report upon system accounts which have no passwords. CHECK_DISKFREE If this is set to TRUE then the check-diskfree script will be invoked and will allow an alert to be sent if there is any mounted partition is running short on disk space. CHECK_SETUID If this is set to TRUE then the check-setuid script will be invoked, this will compare the setuid binaries upon the system to those that existed previously and show the differences. FILES
/etc/checksecurity.conf checksecurity configuration file SEE-ALSO See also check-diskfree(8), check-setuid(8), and check-passwd(8) Debian Linux 2 February 1997 CHECKSECURITY(8)
All times are GMT -4. The time now is 10:51 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy