02-16-2012
Quote:
Originally Posted by
alexscript
Anyway security aspect is a problem should be tackled as a whole, don't limited to the operating system, more or less secure.
Excellent point. A well-configured Linux system is more secure than a poorly configured BSD system, and vice versa.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
:( :confused: what is performed by the following unix command:
grep -v Jane project1.txt
and
grep ' 5\..' janet.txt (1 Reply)
Discussion started by: Tendernisin
1 Replies
2. UNIX for Dummies Questions & Answers
Hi all,
I'd like to install either Unix or Linux on my PC and I don't know which way to go- I've tried with HP-UX 11.11 and it failed but I've heard that LInux is the fastest growing operating system in the world.I am asking you thus what sort of Linux distribution would be the best choice for a... (8 Replies)
Discussion started by: adrian262
8 Replies
3. Shell Programming and Scripting
Hi, I've created a script in csh that takes a file and checks it for mispelled words. Im almost done but I need to do two more things but I need help.
First, when displaying an incorrect word to the user, I need to show the line of the input file that contains the word.
Second,if the user... (0 Replies)
Discussion started by: hckygoli31
0 Replies
4. UNIX for Dummies Questions & Answers
Which distributions are known to have great performance, but also excellent ease of use and compatibility on VMware Workstation 6? I have 2GB of real RAM in my system and Windows Vista Home Premium as a host operating system. I can almost always get away with alotting up to 1GB of RAM for my... (1 Reply)
Discussion started by: MrrrrrNiceGuy
1 Replies
5. Shell Programming and Scripting
I'm using a PERL cgi script that uses rrdtool to make graphs. I can't get the syntax correct to use a degree sign (alt+0176 like this °) and also using a variable.
If I use single quotes, I can't call the variable. If I use double quotes, there is an extra symbol (Â) before the ° which goes... (2 Replies)
Discussion started by: audiophile
2 Replies
6. Shell Programming and Scripting
Hi All,
I would just like to know if the /etc/init.d directory which is used to hold the start up scripts is available in all linux distributions? Are there any exceptions
One more question
Is the command chkconfig available in all Linux distributions and used in a similar fashions... (2 Replies)
Discussion started by: gurubarancse
2 Replies
7. Shell Programming and Scripting
Hi everyone,
Is there anywhere I can find a complete table of all characters that must be escaped by the various UNIX shells and scripting languages?
It seems every command/shell/scripting language has different rules about what characters must be escaped.
I do a lot of searching and... (3 Replies)
Discussion started by: troym72
3 Replies
8. UNIX for Dummies Questions & Answers
Ok so I am working on a command that is going to do a Dig @ a certain IP address which is enclosed in a variable.
Now I thought I had this figure out because it works. The problem is that it does not ALWAYS work.
the variable is IP=192.168.1.1
the commands I have tried are
dig... (2 Replies)
Discussion started by: MrEddy
2 Replies
9. UNIX for Dummies Questions & Answers
I'm new in the UNIX world. I'm just wondering what are the different examples of unix distributions? (2 Replies)
Discussion started by: j3ff_skull
2 Replies
LEARN ABOUT FREEBSD
_secure_path
_SECURE_PATH(3) BSD Library Functions Manual _SECURE_PATH(3)
NAME
_secure_path -- determine if a file appears to be secure
LIBRARY
System Utilities Library (libutil, -lutil)
SYNOPSIS
#include <sys/types.h>
#include <libutil.h>
int
_secure_path(const char *path, uid_t uid, gid_t gid);
DESCRIPTION
This function does some basic security checking on a given path. It is intended to be used by processes running with root privileges in
order to decide whether or not to trust the contents of a given file. It uses a method often used to detect system compromise.
A file is considered 'secure' if it meets the following conditions:
1. The file exists, and is a regular file (not a symlink, device special or named pipe, etc.),
2. Is not world writable.
3. Is owned by the given uid or uid 0, if uid is not -1,
4. Is not group writable or it has group ownership by the given gid, if gid is not -1.
RETURN VALUES
This function returns zero if the file exists and may be considered secure, -2 if the file does not exist, and -1 otherwise to indicate a
security failure. The syslog(3) function is used to log any failure of this function, including the reason, at LOG_ERR priority.
SEE ALSO
lstat(2), syslog(3)
HISTORY
Code from which this function was derived was contributed to the FreeBSD project by Berkeley Software Design, Inc.
BUGS
The checks carried out are rudimentary and no attempt is made to eliminate race conditions between use of this function and access to the
file referenced.
BSD
May 2, 1997 BSD