Sponsored Content
Operating Systems HP-UX After becoming HP UX 11iV3 System Admin Post 302699911 by methyl on Wednesday 12th of September 2012 02:26:43 PM
Old 09-12-2012
Learn Backup and Restore to Disaster Recovery level. This is the first and most important responsibility of the Systems Administrator.
Practice, rehearse, be confident and competent.
This User Gave Thanks to methyl For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

UNIX System Admin Document

Hi all I am trying to document my entire system (hardware/software/admin) Is there a template I could use for the purpose. This document will be the used by all System admins/ Management the company when they want to find out anyting about any of the servers we manage. If there is no such... (6 Replies)
Discussion started by: skotapal
6 Replies

2. HP-UX

donation on hpux system admin cbt disks

Does anyone has a CBT diskett on HPUX admin that you want to donate or sell for $50. I"m a newby admin in need of assistant... thanks..all :( (0 Replies)
Discussion started by: hpux2006
0 Replies

3. Shell Programming and Scripting

Scripting language for system admin

Am trying to learn a scripting language to automate mundane system admin tasks. Being a Novice, Just trying to understand, which language would be easier to learn and one for all types. i.e Perl or Shell scripting. Which of these would be good for a system admin, Database admin ?? pls. post... (2 Replies)
Discussion started by: Crazy_murli
2 Replies

4. AIX

New to AIX System Admin

Hi everyone, im new to AIX, where can I find some free beginner AIX System admin guide which is similar to AIX Basic Operations V5 http://www-03.ibm.com/certify/tests/obj190.shtml (9 Replies)
Discussion started by: ibmer414
9 Replies

5. AIX

L2 and L3 AIX System Admin Tasks

Hello Everyone...I am new to this forum and before asking i already see links for books and videos...I would like to know the tasks for L2 and L3 AIX System Admin. edit by bakunin: You shouldn't hijack others threads for your own questions. If you have a genuine question to ask you're entitled... (3 Replies)
Discussion started by: Allhappies
3 Replies

6. Homework & Coursework Questions

System Admin. Lab

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Create a group id with your last name. Create 2 user IDs using your last name and the numbers 1 and 2. For each... (3 Replies)
Discussion started by: Jagst3r21
3 Replies

7. Red Hat

System Admin related document with example

Hi, I am looking for perfect document.which is covered all the admin role with examples..... --> Please say that "search in google"...... Can you please help on this.... Thanks & Regards, Mani (3 Replies)
Discussion started by: Mani_apr08
3 Replies

8. Linux

Kernel developer or system admin

Hi, I am already working as Linux admin for last 5 years. Now I want to do something more. So wanted to ask you guys what would be better. I have 2 interests for making my future 1. Linux kernel development 2. Linux system admin + storage Welcome your thoughts!!! (5 Replies)
Discussion started by: prashant2507198
5 Replies

9. Red Hat

Would like to study and take rh system admin exam.

hello, when the times comes where do I schedule for the linux system admin exam? I have taken exams before through vue or prometric I did not see rh system admin exam on either site? any feedback would be helpful such as cost? how many test is it one or two? is the comptia linux+ just as recognized... (3 Replies)
Discussion started by: arcolinux
3 Replies
forgeries(7)                                             Miscellaneous Information Manual                                             forgeries(7)

NAME
forgeries - how easy it is to forge mail SUMMARY
An electronic mail message can easily be forged. Almost everything in it, including the return address, is completely under the control of the sender. An electronic mail message can be manually traced to its origin if (1) all system administrators of intermediate machines are both coopera- tive and competent, (2) the sender did not break low-level TCP/IP security, and (3) all intermediate machines are secure. Users of cryptography can automatically ensure the integrity and secrecy of their mail messages, as long as the sending and receiving machines are secure. FORGERIES
Like postal mail, electronic mail can be created entirely at the whim of the sender. From, Sender, Return-Path, and Message-ID can all contain whatever information the sender wants. For example, if you inject a message through sendmail or qmail-inject or SMTP, you can simply type in a From field. In fact, qmail-inject lets you set up MAILUSER, MAILHOST, and MAILNAME environment variables to produce your desired From field on every message. TRACING FORGERIES
Like postal mail, electronic mail is postmarked when it is sent. Each machine that receives an electronic mail message adds a Received line to the top. A modern Received line contains quite a bit of information. In conjunction with the machine's logs, it lets a competent system administra- tor determine where the machine received the message from, as long as the sender did not break low-level TCP/IP security or security on that machine. Large multi-user machines often come with inadequate logging software. Fortunately, a system administrator can easily obtain a copy of a 931/1413/Ident/TAP server, such as pidentd. Unfortunately, some system administrators fail to do this, and are thus unable to figure out which local user was responsible for generating a message. If all intermediate system administrators are competent, and the sender did not break machine security or low-level TCP/IP security, it is possible to trace a message backwards. Unfortunately, some traces are stymied by intermediate system administrators who are uncooperative or untrustworthy. CRYPTOGRAPHY
The sender of a mail message may place his message into a cryptographic envelope stamped with his seal. Strong cryptography guarantees that any two messages with the same seal were sent by the same cryptographic entity: perhaps a single person, perhaps a group of cooperat- ing people, but in any case somebody who knows a secret originally held only by the creator of the seal. The seal is called a public key. Unfortunately, the creator of the seal is often an insecure machine, or an untrustworthy central agency, but most of the time seals are kept secure. One popular cryptographic program is pgp. SEE ALSO
pgp(1), identd(8), qmail-header(8) forgeries(7)
All times are GMT -4. The time now is 12:30 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy