Sponsored Content
Full Discussion: Integrity
Special Forums Cybersecurity IT Security RSS Integrity Post 302465463 by Linux Bot on Friday 22nd of October 2010 01:15:03 PM
Old 10-22-2010
Integrity

As professionals, we focus a great deal on integrity, both professional/personal, as well as data integrity.  However, I think the two are intertwined inexorably.  But, that's a post for a different time.

For now, about data integrity, particularly data feed integrity.

I've asked business partners, colleagues, peers and vendors, and get the same answer, I don't think it's just me.  Developers and system integrators have gotten so lazy and used to reliable communications, that it seems developers no longer consider data integrity components of value when developing their applications and reading/writing external resources.  This, naturally, creates a ripe target for vulnerability exploits through the use of fuzzers, and also a soft-underbelly that seems rather easily missed by testers.

So, pardon the curmugeonly stance, but I'm crying fowl1.  Developers MUST get their ducks in a row when it comes to data integrity!  Batch totals, hash totals, trial sums, header/trailer records, file locking and semaphores, validation on access of any resource, record counts, signed hash, all of these are necessary, yet it seems a lost art.

What is your experience?  Do you also find developers and integrators woefully deficient in ensuring processing file integrity?

1- yes, spelling is intentionally munged.  Please don't comment and cry foul. Or fowl.

Image
Image

More...
 

8 More Discussions You Might Find Interesting

1. Solaris

File Integrity Check

Hi, I have two NFS shares mounted on a solaris system. share1 and share2 , both are from different NFS servers share1 has 500GB of data share 2 is empty. I am copying all the data from share1 to share2. It is like migrating the data from one NFS share to another. Is there... (8 Replies)
Discussion started by: athreyavc
8 Replies

2. Cybersecurity

File Integrity checker with recovery

Hello friends I have an CentosOS 5 box running Apache, I want to Install a powerful File Integrity checker with recovery option to maintain any changes may be happened without my hand Could you help me to recommend such solution Thanks (3 Replies)
Discussion started by: reaky
3 Replies

3. Shell Programming and Scripting

Maintaining Command Line Integrity

Hi everyone, I have a script that takes command line entries, for example # script.sh 1 "2" 3 4 "5" I want to be able to maintain the integrity of this command line such that it is processed with the double quotes i.e.: VAR1=1 VAR2="2" VAR3=3 VAR4=4 VAR5="5" The double-quotes... (2 Replies)
Discussion started by: procux
2 Replies

4. Shell Programming and Scripting

data integrity check needed

Hi friends I need copied 100gd of data to other Solaris server. Could anyone help me guiding appropriate way of checking data integrity at source and destination so can I delete the data at source location . How can print/check cksum of individual file in each folder and match it with... (7 Replies)
Discussion started by: hk_kamozalwar
7 Replies

5. UNIX for Dummies Questions & Answers

compressed and tar file integrity

How can I ensure the folder that I tar and compress is good to be archive in DVD or tape? Must I uncompress and untar the file, or there is any way to tell the integerity of the compressed file before send to archive? I have bad experience on this, which the archive compressed file cold not be... (2 Replies)
Discussion started by: vivien_chu
2 Replies

6. HP-UX

Basic questions about Integrity VMs

Hello, I am looking into HP-UX 11.31 VMs and I had a few questions. We own two systems with 11.31 installed on them: HP 9000 rp3440 (RISC) - 2gb memory - 2 processors HP Integrity rx2660 (Itanium) - 8gb memory - 4 processors Looking at the memory requirements in the Integrity VM... (4 Replies)
Discussion started by: bstring
4 Replies

7. UNIX for Dummies Questions & Answers

Integrity check for the backup

Hello I thought of different ways of integrity check for the backup and look for the fastest approach to start programming. in all these approaches randomness is used. I would appreciate if someone give more suggestions or correct me. 1- Machine Name Check We can check if the machines were... (5 Replies)
Discussion started by: frhling
5 Replies

8. HP-UX

Downloading or purchasing HP-UX for HP Integrity rx4640

Hi I bought an old server hp rx4640 for 160$ on the online auction, but I do not have the cd with the operating system for it. Can you tell me if there is any way to obtain CDs with HP-UX form HPE? What kind of version can I get from HPE? Do I have to pay for it? Do you I have to buy a cd... (3 Replies)
Discussion started by: gbudny
3 Replies
SLAPO-REFINT(5) 						File Formats Manual						   SLAPO-REFINT(5)

NAME
slapo-refint - Referential Integrity overlay to slapd SYNOPSIS
/etc/ldap/slapd.conf DESCRIPTION
The Referential Integrity overlay can be used with a backend database such as slapd-bdb(5) to maintain the cohesiveness of a schema which utilizes reference attributes. Integrity is maintained by updating database records which contain the named attributes to match the results of a modrdn or delete opera- tion. For example, if the integrity attribute were configured as manager, deletion of the record "uid=robert,ou=people,dc=example,dc=com" would trigger a search for all other records which have a manager attribute containing that DN. Entries matching that search would have their manager attribute removed. Or, renaming the same record into "uid=george,ou=people,dc=example,dc=com" would trigger a search for all other records which have a manager attribute containing that DN. Entries matching that search would have their manager attribute deleted and replaced by the new DN. rootdn must be set for the database. refint runs as the rootdn to gain access to make its updates. rootpw is not needed. CONFIGURATION
These slapd.conf options apply to the Referential Integrity overlay. They should appear after the overlay directive. refint_attributes <attribute> [...] Specify one or more attributes for which integrity will be maintained as described above. refint_nothing <string> Specify an arbitrary value to be used as a placeholder when the last value would otherwise be deleted from an attribute. This can be useful in cases where the schema requires the existence of an attribute for which referential integrity is enforced. The attempted deletion of a required attribute will otherwise result in an Object Class Violation, causing the request to fail. The string must be a valid DN. refint_modifiersname <DN> Specify the DN to be used as the modifiersName of the internal modifications performed by the overlay. It defaults to "cn=Referen- tial Integrity Overlay". FILES
/etc/ldap/slapd.conf default slapd configuration file SEE ALSO
slapd.conf(5), slapd-config(5). ACKNOWLEDGEMENTS
OpenLDAP Software is developed and maintained by The OpenLDAP Project <http://www.openldap.org/>. OpenLDAP Software is derived from Uni- versity of Michigan LDAP 3.3 Release. OpenLDAP 2012/04/23 SLAPO-REFINT(5)
All times are GMT -4. The time now is 02:41 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy