Sponsored Content
Full Discussion: How Will the World End?
The Lounge What is on Your Mind? How Will the World End? Post 302523761 by wbala4 on Thursday 19th of May 2011 04:57:10 PM
Old 05-19-2011
Red giant expansion of our Sun burns up the Earth (Fire)
 

6 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Need UNIX shell scripting end to end information

Hi, I would like to learn shell scripting in UNIX. Can any one please give me the support and share the information/documents with me. If any documents please post it to aswanikumar_nimmagadda@yahoo.co.in Thanks in advance...!!! (3 Replies)
Discussion started by: aswani_n
3 Replies

2. Shell Programming and Scripting

Add end of char \n on end of file

Hi, I want to add \n as a EOF at the end of file if it does't exist in a single command. How to do this? when I use command echo "1\n" > a.txt and od -c a.txt 0000000 1 \n \n 0000003 How does it differentiate \n and eof in this case? Regards, Venkat (1 Reply)
Discussion started by: svenkatareddy
1 Replies

3. Shell Programming and Scripting

Use of Begin IF ,END IF END not working in the sql script

Hi I have written a script .The script runs properly if i write sql queries .But if i use PLSQL commands of BEGIN if end if , end ,then on running the script the comamds are getting printed on the prompt . Ex :temp.sql After connecting to the databse at the sql prompt i type... (1 Reply)
Discussion started by: isha_1
1 Replies

4. Post Here to Contact Site Administrators and Moderators

Comments on "How Will the World End?"

I have read the sun-expansion scenario numerous places but I've never read any suggestion that the earth's orbit would increase to avoid being scorched. What mechanism would push it out? As for creating a black hole by the LHC, the whole concept is silly so any number of reasons would rule it... (9 Replies)
Discussion started by: KenJackson
9 Replies

5. War Stories

The (Mis)Information Age – The End of the World as We Know It and What Vault7 Teaches Us

I hope you will enjoy reading this essay I wrote: The (Mis)Information Age – The End of the World as We Know It and What Vault7 Teaches Us If you are a true "IT person" i.e. a software developer, code or deep system admin, I think you will resonate with the theme of my essay. I could... (8 Replies)
Discussion started by: Neo
8 Replies

6. What is on Your Mind?

Mad World Remix of Moby Video (Are You Lost In The World Like Me)

This is an excellent video comment on modern society and the remix is good too: https://www.youtube.com/watch?v=5DU1B_XkyIk 5DU1B_XkyIk Watch the video above and post your comments. (3 Replies)
Discussion started by: Neo
3 Replies
sckmd(1M)						  System Administration Commands						 sckmd(1M)

NAME
sckmd - Sun Fire High-End system key management daemon SYNOPSIS
/usr/platform/SUNW,Sun-Fire-15000/lib/sckmd DESCRIPTION
sckmd is a server process that resides on a Sun Fire high-end system domain. sckmd maintains the Internet Protocol Security (IPsec) Secu- rity Associations (SAs) needed to secure the communication between the Sun Fire 15K System Controller (SC) and the cvcd(1M) and dcs(1M) daemons running on a Sun Fire 15K domain. See ipsec(7P) for a description of Security Associations. sckmd receives SAs from the SC and provides these SAs to the Security Association Databases (SADBs) using pf_key(7P). sckmd normally starts up at system boot time. Each domain supports only one running sckmd process at a time. FILES
/etc/inet/ipsecinit.conf Configuration file for default system-wide IPsec policies ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+------------------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+------------------------------------+ |Architecture |Sun Fire High-End systems | +-----------------------------+------------------------------------+ |Availability |SUNWsckmx.u, SUNWsckmu.u, SUNWsckmr | +-----------------------------+------------------------------------+ SEE ALSO
cvcd(1M), dcs(1M), ipsecconf(1M), ipsecalgs(1M), attributes(5), ipsec(7P), ipsecah(7P), ipsecesp(7P), pf_key(7P) Sun Enterprise 10000 SSP Reference Manual System Management Services (SMS) Reference Manual NOTES
IPsec is used by Sun Fire high-end systems such as a Sun Fire 15K, to secure the communication between the SC, and the cvcd(1M) and dcs(1M) daemons running on a domain. System-wide IPsec policies for these daemons are configured on a domain with ipsecconf(1M). Default policies are defined when the SUNWsckmr package is installed on a Sun Fire high-end system domain at OS install time. Package SUNWsckmr configures default system-wide policies for cvcd(1M) and dcs(1M) by adding the following entries in /etc/inet/ipsecinit.conf: { dport sun-dr ulp tcp } permit { auth_alg md5 } { sport sun-dr ulp tcp } apply { auth_alg md5 sa unique } { dport cvc_hostd ulp tcp } permit { auth_alg md5 } { sport cvc_hostd ulp tcp } apply { auth_alg md5 sa unique } The cvc_hostd service represents cvcd(1M) and the sun-dr service represents dcs(1M) in the preceding entries. These policies conform to the format defined by ipsec(7P) and require and require IPsec AH protection using the HMAC-MD5 algorithm. See ipsecah(7P). System-wide policies for cvcd(1M) and dcs(1M) configured on a domain using ipsecconf(1M) must match the IPsec policies defined for these services on the SC. On an SC, IPsec policies for these services are defined by the SMS key management daemon. Refer to thekmd(1M) man page in the System Management Services (SMS) Reference Manual. IPsec encryption or authentication with encryption can be enabled on the domain using the encr_algs and encr_auth_algs properties, as described in the ipsecconf(1M) manual page. For example, the following ipsecconf(1M) entries require IPsec ESP protection using the Triple- DES encryption algorithm and the HMAC-MD5 authentication algorithm. { dport cvc_hostd ulp tcp } permit { encr_algs 3des encr_auth_algs md5 } { sport cvc_hostd ulp tcp } apply { encr_algs 3des encr_auth_algs md5 sa unique } See ipsecesp(7P) for more information on the IPsec ESP protocol. You can obtain a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. SunOS 5.10 23 Oct 2003 sckmd(1M)
All times are GMT -4. The time now is 03:46 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy