Not impossible, if you've ever heard of the Morrison worm but in general, I think, not a good idea. C is a high-low-level language making sending its own program to a host of unknown architecture and facilities difficult. If it's sending compiled code, it may only work on closely related machines and architectures, and if it's not, it'll only work on sufficiently portable machines that also have the facilities to compile it.
Remote scripting on the other hand is straightforward.
This is quite a general question:
I am trying to detect whether people accessing my network are using a proxy server. This is *not* to ensure that web pages are not cached!
The only way that I can think of doing this is to intercept at packet level and examine the source port for... (1 Reply)
Hi, I've been racking my brains trying to remember, but, whats the command to change the default shell? I'm currently always in the Korn shell and I want to start out in the Bash shell. I'm running a variant of BSD I guess in Mac OS X 10.2.2 and Mandrake. Thanks.
ccindyderek:confused: (4 Replies)
Hi all
My job is to bootup the servers (1 sun solaris 5.8, 3 sco (release 5) and 1 windows 2000), taking backup of the servers and shut down.
Apart from this, there are nearly 150 users for our oracle9i database (forms 3 and d2k as front end). As for as oracle 9i is concerned my job is to... (0 Replies)
hi
I am new to this forum. hope to get help from u all.
how can i write these by using shell programming?
1. The name of the machine and the date/time at which the report was produced.
2. Licensing information such as the operating system revision level and license restrictions in terms of... (1 Reply)
Hi all,
I am having putty in my system.But I dont have access to any UNIX Servers.Is there any default or common UNIX Server so that anyone can access and be familiar with UNIX and Shell scripting.
I want to work and practice in UNIX..Thats why I am asking this question.
Kindly give me... (2 Replies)
Dear Unix community over the last couple of days I have been working on learning Unix scripting on iOS using terminal on a jail-broken device...
I am having trouble with if statements and giving the user a y or n choice that do different things when entered. The following is my code so far...... (5 Replies)
Discussion started by: mbf123
5 Replies
LEARN ABOUT DEBIAN
mac_test
MAC_TEST(4) BSD Kernel Interfaces Manual MAC_TEST(4)NAME
mac_test -- MAC framework testing policy
SYNOPSIS
To compile the testing policy into your kernel, place the following lines in your kernel configuration file:
options MAC
options MAC_TEST
Alternately, to load the testing module at boot time, place the following line in your kernel configuration file:
options MAC
and in loader.conf(5):
mac_test_load="YES"
DESCRIPTION
The mac_test policy module implements a testing facility for the MAC framework. Among other things, mac_test will try to catch corrupt
labels the system is attempting to destroy and drop to the debugger. Additionally, a set of statistics regarding the number of times various
MAC framework entry points have been called is stored in the security.mac.test sysctl(8) tree.
Label Format
No labels are defined for mac_test.
SEE ALSO mac(4), mac_biba(4), mac_bsdextended(4), mac_ifoff(4), mac_lomac(4), mac_mls(4), mac_none(4), mac_partition(4), mac_portacl(4),
mac_seeotheruids(4), mac(9)HISTORY
The mac_test policy module first appeared in FreeBSD 5.0 and was developed by the TrustedBSD Project.
AUTHORS
This software was contributed to the FreeBSD Project by Network Associates Labs, the Security Research Division of Network Associates Inc.
under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the DARPA CHATS research program.
BUGS
See mac(9) concerning appropriateness for production use. The TrustedBSD MAC Framework is considered experimental in FreeBSD.
While the MAC Framework design is intended to support the containment of the root user, not all attack channels are currently protected by
entry point checks. As such, MAC Framework policies should not be relied on, in isolation, to protect against a malicious privileged user.
BSD December 1, 2002 BSD