07-29-2011
Security Rule #1:
There is no security without physical security.
Glad it worked out.
10 More Discussions You Might Find Interesting
1. UNIX Desktop Questions & Answers
Guys could you please tell me which appropriate command is used to set hardware (BIOS) clock so that the system keeps time when it reboots & how it's used. I use Linux
Thank you (2 Replies)
Discussion started by: joseph kembo
2 Replies
2. UNIX for Advanced & Expert Users
how can i show the contain of the bios parameter block of a file system in minix or unix or a similar os?
Here are some of the things i wanna print:
- Logical bytes per sector
- Sector per cluster
- Number of fats
- Fat type
:confused: (2 Replies)
Discussion started by: Esteban
2 Replies
3. Solaris
I am using solaris 10
how to get the bios version?
thanks (4 Replies)
Discussion started by: melanie_pfefer
4 Replies
4. Red Hat
Hello,
I got a computer in which I decided to change RAM memory cards.
These (2) RAMs are:
Brand: Crucial Technology DDR Ram 266 Mhz
and when I ran memtest86 tool, both of them have errors.
So I decided to change them and purchase a new ones.
I bought:
Brand: Patriot DDR RAM 512 Mb 266... (2 Replies)
Discussion started by: inhaki
2 Replies
5. Hardware
Hi,
I have to get into BIOS and disable onbaord NICS for an IBM server, can someone please help me out.
I tried hitting F1 when reboot to get into BIOS, but it seems like a setup screen and I dont see any option to disable NICS?
Thanks
Sam (2 Replies)
Discussion started by: sam4919
2 Replies
6. Hardware
Hi friends,
I hope you are doing well. Can you please tell me which part of the motherboard contains the BIOS software, name that exact location. And could please give me the names of the firmwares for atleast 5 archetictures, like sun sparc, ibm power, hp alpha etc.
Looking forward to your... (0 Replies)
Discussion started by: gabam
0 Replies
7. Debian
okay,i made a grave mistake in installing the base bare bones install of debian.
here i have edited this from the original.
this morning when i got home from work i did some searching and then just shut the system down via the mechanical off on switch. waited a few minutes and then restarted... (0 Replies)
Discussion started by: cowLips
0 Replies
8. Ubuntu
I have a problem with a brand new Dell laptop. BioLinux was installed on it without making the necessary changes on BIOS. The installation was completed successfully but the BIOS system cant find the OS after rebooting the machine.
I have tried to modify the BIOS setting with no luck this far. I... (7 Replies)
Discussion started by: Xterra
7 Replies
9. UNIX for Beginners Questions & Answers
I need to update a setting in the BIOS on our SCO Openserver 5.0.7 system and all I can bring up about it says I need to create a dos bootable disk of some sort. The problem is that it doesn't seem like dos is loading up fully. I created the dos bootable thumb drive on a Windows PC using Rufus... (7 Replies)
Discussion started by: hometrics
7 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT CENTOS
rlm_pap
rlm_pap(5) FreeRADIUS Module rlm_pap(5)
NAME
rlm_pap - FreeRADIUS Module
DESCRIPTION
The rlm_pap module authenticates RADIUS Access-Request packets that contain a User-Password attribute. The module should also be listed
last in the authorize section, so that it can set the Auth-Type attribute as appropriate.
When a RADIUS packet contains a clear-text password in the form of a User-Password attribute, the rlm_pap module may be used for authenti-
cation. The module requires a "known good" password, which it uses to validate the password given in the RADIUS packet. That "known good"
password must be supplied by another module (e.g. rlm_files, rlm_ldap, etc.), and is usually taken from a database.
CONFIGURATION
The only relevant configuration item is:
auto_header
If set to "yes", the module will look inside of the User-Password attribute for the headers {crypt}, {clear}, etc., and will auto-
matically create the appropriate attribute, with the correct value.
This module understands many kinds of password hashing methods, as given by the following table.
Header Attribute Description
------ --------- -----------
{clear} Cleartext-Password clear-text passwords
{cleartext} Cleartext-Password clear-text passwords
{crypt} Crypt-Password Unix-style "crypt"ed passwords
{md5} MD5-Password MD5 hashed passwords
{smd5} SMD5-Password MD5 hashed passwords, with a salt
{sha} SHA-Password SHA1 hashed passwords
{ssha} SSHA-Password SHA1 hashed passwords, with a salt
{nt} NT-Password Windows NT hashed passwords
{x-nthash} NT-Password Windows NT hashed passwords
{lm} LM-Password Windows Lan Manager (LM) passwords.
The module tries to be flexible when handling the various password formats. It will automatically handle Base-64 encoded data, hex
strings, and binary data, and convert them to a format that the server can use.
It is important to understand the difference between the User-Password and Cleartext-Password attributes. The Cleartext-Password attribute
is the "known good" password for the user. Simply supplying the Cleartext-Password to the server will result in most authentication meth-
ods working. The User-Password attribute is the password as typed in by the user on their private machine. The two are not the same, and
should be treated very differently. That is, you should generally not use the User-Password attribute anywhere in the RADIUS configura-
tion.
For backwards compatibility, there are old configuration parameters which may be work, although we do not recommend using them.
SECTIONS
authorize authenticate
FILES
/etc/raddb/radiusd.conf
SEE ALSO
radiusd(8), radiusd.conf(5)
AUTHOR
Alan DeKok <aland@freeradius.org>
6 June 2008 rlm_pap(5)