07-29-2011
Security Rule #1:
There is no security without physical security.
Glad it worked out.
10 More Discussions You Might Find Interesting
1. UNIX Desktop Questions & Answers
Guys could you please tell me which appropriate command is used to set hardware (BIOS) clock so that the system keeps time when it reboots & how it's used. I use Linux
Thank you (2 Replies)
Discussion started by: joseph kembo
2 Replies
2. UNIX for Advanced & Expert Users
how can i show the contain of the bios parameter block of a file system in minix or unix or a similar os?
Here are some of the things i wanna print:
- Logical bytes per sector
- Sector per cluster
- Number of fats
- Fat type
:confused: (2 Replies)
Discussion started by: Esteban
2 Replies
3. Solaris
I am using solaris 10
how to get the bios version?
thanks (4 Replies)
Discussion started by: melanie_pfefer
4 Replies
4. Red Hat
Hello,
I got a computer in which I decided to change RAM memory cards.
These (2) RAMs are:
Brand: Crucial Technology DDR Ram 266 Mhz
and when I ran memtest86 tool, both of them have errors.
So I decided to change them and purchase a new ones.
I bought:
Brand: Patriot DDR RAM 512 Mb 266... (2 Replies)
Discussion started by: inhaki
2 Replies
5. Hardware
Hi,
I have to get into BIOS and disable onbaord NICS for an IBM server, can someone please help me out.
I tried hitting F1 when reboot to get into BIOS, but it seems like a setup screen and I dont see any option to disable NICS?
Thanks
Sam (2 Replies)
Discussion started by: sam4919
2 Replies
6. Hardware
Hi friends,
I hope you are doing well. Can you please tell me which part of the motherboard contains the BIOS software, name that exact location. And could please give me the names of the firmwares for atleast 5 archetictures, like sun sparc, ibm power, hp alpha etc.
Looking forward to your... (0 Replies)
Discussion started by: gabam
0 Replies
7. Debian
okay,i made a grave mistake in installing the base bare bones install of debian.
here i have edited this from the original.
this morning when i got home from work i did some searching and then just shut the system down via the mechanical off on switch. waited a few minutes and then restarted... (0 Replies)
Discussion started by: cowLips
0 Replies
8. Ubuntu
I have a problem with a brand new Dell laptop. BioLinux was installed on it without making the necessary changes on BIOS. The installation was completed successfully but the BIOS system cant find the OS after rebooting the machine.
I have tried to modify the BIOS setting with no luck this far. I... (7 Replies)
Discussion started by: Xterra
7 Replies
9. UNIX for Beginners Questions & Answers
I need to update a setting in the BIOS on our SCO Openserver 5.0.7 system and all I can bring up about it says I need to create a dos bootable disk of some sort. The problem is that it doesn't seem like dos is loading up fully. I created the dos bootable thumb drive on a Windows PC using Rufus... (7 Replies)
Discussion started by: hometrics
7 Replies
10. Forum Support Area for Unregistered Users & Account Problems
I was unable to login and so used the "Forgotten Password' process. I was sent a NEWLY-PROVIDED password and a link through which my password could be changed. The NEWLY-PROVIDED password allowed me to login.
Following the provided link I attempted to update my password to one of my own... (1 Reply)
Discussion started by: Rich Marton
1 Replies
LEARN ABOUT OSF1
secconfig
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)