Sponsored Content
Full Discussion: hacking
Special Forums Cybersecurity hacking Post 302536569 by Neo on Tuesday 5th of July 2011 10:00:04 PM
Old 07-05-2011
Hello!

In case you forgot to read the forum rules, here is quick copy.

Quote:
RULES OF THE UNIX AND LINUX FORUMS


(1) No flames, shouting (all caps), sarcasm, bullying, profanity or arrogant posts.

(2) No negative comments about others or impolite remarks. Be patient.

(3) Refrain from idle chatter that does not contribute to the knowledge base. This does not apply to the forums in The Unix Lounge which are for off-topic discussions.

(4) Do not 'bump up' questions if they are not answered promptly. No duplicate or cross-posting and do not report a post or send a private message where your goal is to get an answer more quickly.

(5) Search the forums database with your keywords before asking.

(6) Do not post classroom or homework problems.

(7) No job postings from headhunters or recruiters except in The Unix Forums Job Board. See How to Post to The UNIX Forums Job Board for information on using the Job Board.

(8) No BSD vs. Linux vs. Windows or similar threads.

(9) Edit your posts if you see spelling or grammar errors (don't write in cyberchat or cyberpunk style). English only.

(10) Don't post your email address and ask for an email reply. Don't send a private message with a technical question. The forums are for the benefit of all, so all Q&A should take place in the forums.

(11) Post questions with descriptive subjects. For example, do not post questions with subjects like "Help Me!", "Urgent!!" or "Doubt". Post subjects like "Execution Problems with Cron" or "Help with Backup Shell Script".

(12) These are not hacker boards so hacker related posts will be promptly deleted or moderated.

(13) The forum administrators reserve the right to prune, move or edit posts that do not adhere to the rules or are technically inaccurate.

(14) The forum administrators reserve the right to remove users or change their posting status to read only without notice if any rules are not followed.

(15) No smoking in the forums.
Cheers.

The UNIX and Linux Forums
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Hacking

I asked my firend about hacking so he told me to come here. I want to know how to get Volumes I, II and III. Does anyone know how to help me and help me become a good hacker? This is what i came here to do!!!!!! (2 Replies)
Discussion started by: nfsu2
2 Replies

2. Linux

Hacking

Im wondering how i can chat to some one (1 Reply)
Discussion started by: Neas
1 Replies

3. UNIX for Dummies Questions & Answers

Hacking in UNIX

Just give link to hacking soft like ipscanners, brutforses, firewalls , etc maybe you know about new projects in this area p.s. thanks for help You might want to read the rules - Note # 11. Thread closed. (0 Replies)
Discussion started by: Ty3
0 Replies

4. Solaris

Hacking with Solaris 10

Can I hack/crack a program or game with Solaris 10? Please response. (1 Reply)
Discussion started by: pirate666
1 Replies

5. Cybersecurity

What kind of hacking is going on here??

Connecting to the Internet with OpenVPN, the connection fails. Rerunning openvpn works second time round but the install is hacked at that point (e.g., a rogue 'java-security' update tries to install itself on 'yum update', yum however spots this and rejects the download, other basic things start... (3 Replies)
Discussion started by: GSO
3 Replies

6. What is on Your Mind?

Hacking buddy

Hi, I am looking for a technical soul willing to play around with technical stuff and exchange the knowledge and experience no matter how skilled would that be either begginer or experienced geek. If anybody interested just ping me in the thread here. Wish you a great day! (9 Replies)
Discussion started by: smoofy
9 Replies
secdef(3)						     Library Functions Manual							 secdef(3)

NAME
secdef: open_secdef(), close_secdef(), get_secdef_str(), get_secdef_int() - security defaults configuration file routines SYNOPSIS
DESCRIPTION
opens the security configuration file This function must be called prior to calling or closes the security configuration file. and return the value of the specified parameter defined in the security configuration file. See the security(4) manpage. Programs using these routines must be compiled with APPLICATION USAGE
In a multithreaded application, these interfaces are thread-safe, but not async-cancel-safe. A cancellation point may occur when a thread is executing any of these interfaces. RETURN VALUE
returns a value of if the open completed successfully. Otherwise, it returns and leaves unchanged from the call. and return the follow- ing: The value of the specified parameter was successfully returned. The entry was not found, or the security configuration file was not opened. The format of the entry was incorrect. EXAMPLES
This example obtains the "path" from the parameter. FILES
Security defaults configuration file. SEE ALSO
security(4). secdef(3)
All times are GMT -4. The time now is 03:49 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy