Sponsored Content
Top Forums Shell Programming and Scripting Script protection against changes Post 302733613 by agama on Tuesday 20th of November 2012 06:58:48 PM
Old 11-20-2012
You can download it and build it in your home directory -- no need to 'install' it. Of course, company policy might prohibit that too which is too bad.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Override protection.....

I am having this problem......when I run this script: print -n "Enter file name to be deleted: " read answer if then rm $name else echo "No such file with the name: $name exists" fi I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies

2. Filesystems, Disks and Memory

protection schemes

Consider a system that supports 5,000 users. Suppose you want 4,990 of these users to be able to access one file How would you specify this protection scheme in UNIX (4 Replies)
Discussion started by: mattyboy
4 Replies

3. Cybersecurity

spam and protection?

Hello, Long time ago we used to suffer from relay and users using your own mailservers to spam but thanks god for auth-before-pop. But now i'm facing small problem with someone which us he is spaning using whatever mailserver with your@email.address.com and when these emails go to unknown... (10 Replies)
Discussion started by: Bashar
10 Replies

4. Shell Programming and Scripting

override protection 644 (yes/no)?

Hi pls help me out to short out this problem rm PAB113_011.out rm: PAB113_011.out: override protection 644 (yes/no)? n If i give y it remove the file. But i added the rm command as a part of ksh file and i tried to remove the file. Its not removing and the the file prompting as... (9 Replies)
Discussion started by: sri_aue
9 Replies

5. Linux

file security/protection

Hi All I am working on a site to help newbie to learn linux for free. demo.freelinuxconsole.info there is only one file index.php its been able to rename or deleted. Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies

6. Shell Programming and Scripting

Password protection in unix

How to create a file in UNIX which is password protected ? Thanks and Regards, Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies

7. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

8. Homework & Coursework Questions

Protection and special characters

I am learning from the class how to protect the special characters and the script that I wrote here does not work when I am trying to pick up a single quote. It would complaint about parentheses problem. Please, someone could enlighten me. Thanks in advance, Scopiop Input file Hi, * ?... (2 Replies)
Discussion started by: scopiop
2 Replies
SEMODULE(8)								NSA							       SEMODULE(8)

NAME
semodule - Manage SELinux policy modules. SYNOPSIS
semodule [options]... MODE [MODES]... DESCRIPTION
semodule is the tool used to manage SELinux policy modules, including installing, upgrading, listing and removing modules. semodule may also be used to force a rebuild of policy from the module store and/or to force a reload of policy without performing any other transac- tion. semodule acts on module packages created by semodule_package. Conventionally, these files have a .pp suffix (policy package), although this is not mandated in any way. OPTIONS
-R, --reload force a reload of policy -B, --build force a rebuild of policy (also reloads unless -n is used) -D, --disable_dontaudit Temporarily remove dontaudits from policy. Reverts whenever policy is rebuilt -i,--install=MODULE_PKG install/replace a module package -u,--upgrade=MODULE_PKG upgrade an existing module package, or install if the module does not exist -b,--base=MODULE_PKG install/replace base module package -d,--disable=MODULE_NAME disable existing module -e,--enable=MODULE_NAME enable existing module -p,--path=ROOTPATH use an alternate root path -r,--remove=MODULE_NAME remove existing module -l,--list-modules display list of installed modules (other than base) -s,--store name of the store to operate on -n,--noreload,-N do not reload policy after commit -h,--help prints help message and quit -P,--preserve_tunables Preserve tunables in policy -v,--verbose be verbose EXAMPLE
# Install or replace a base policy package. $ semodule -b base.pp # Install or replace a non-base policy package. $ semodule -i httpd.pp # List non-base modules. $ semodule -l # Turn on all AVC Messages for which SELinux currently is "dontaudit"ing. $ semodule -DB # Turn "dontaudit" rules back on. $ semodule -B # Install or replace all non-base modules in the current directory. $ semodule -i *.pp # Install or replace all modules in the current directory. $ ls *.pp | grep -Ev "base.pp|enableaudit.pp" | xargs /usr/sbin/semodule -b base.pp -i SEE ALSO
checkmodule(8), semodule_package(8) AUTHORS
This manual page was written by Dan Walsh <dwalsh@redhat.com>. The program was written by Karl MacMillan <kmacmillan@tresys.com>, Joshua Brindle <jbrindle@tresys.com>, Jason Tang <jtang@tresys.com> Security Enhanced Linux Nov 2005 SEMODULE(8)
All times are GMT -4. The time now is 06:26 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy