08-02-2013
thanks for sharing blackrageous
9 More Discussions You Might Find Interesting
1. AIX
i want to move my AIX os ver 4.2.1 to a new version IBM system. how can i acheive this. (1 Reply)
Discussion started by: gmonix
1 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I need a clarification.
Is there any difference between AIX box and Sun Solaris box?
The bzip command with -c option works in AIX box and the same does not work in Sun Solaris box.
Can anyone please explain if there is an implementation difference in both these boxes for the shell... (1 Reply)
Discussion started by: nisha4680
1 Replies
3. AIX
Does anyone know if there's an easy way to get an AIX system to experiment with? It's easy to learn Linux because it's readily available and can be installed just about anywhere, but it looks like AIX requires proprietary hardware.
My end goal is to test the behavior of packet filtering rules... (4 Replies)
Discussion started by: purefinity
4 Replies
4. AIX
Hi everyone,
Can anyone explain the best practice for keeping an AIX environment up to date? I have 12 AIX LPARs and a whole slew of vulnerabilities. These vulnerabilities vary from OS issues to WebSphere/MQ issues and more. I went through all of them and created a list of APARs I need to apply... (3 Replies)
Discussion started by: need2bageek
3 Replies
5. AIX
This is the password aging script for aix just completed. So far tested and still testing on one of our aix server running 5.3.0.0. So anyway as you can see it is very similar to pwage-hpux-T the only difference on aix /etc/passwd file looks in this format. Also for this script to work you need to... (0 Replies)
Discussion started by: sparcguy
0 Replies
6. AIX
Hi all,
I am trying to exchange hostname and IP address of two AIX machines.
But i am confused as how to change it ?
do i need to use "smitty mktcpip" or "smitty tcpip" ?
what is the difference between smitty mktcpip and smitty tcpip ?
Also anymore steps to follow or just updating... (3 Replies)
Discussion started by: lramsb4u
3 Replies
7. AIX
Dears,
Kindly as preparing to get AIX certification I'd like to have your guide & support where can I find dump or exam forms for below :-
Test 000-103: AIX 6.1 Basic Operations
Test 000-221: AIX 7 Administration
I want to look at real questions and try to solve it , is it possible to... (1 Reply)
Discussion started by: arm
1 Replies
8. UNIX for Dummies Questions & Answers
I have read enough books and know about all the basic commands in unix. I have practiced the same in my home. Now i want to real time work like scheduling cron in a real time server, creating alerts, application status check using unix etc..,
I want to have a real time server acc to do this kind... (3 Replies)
Discussion started by: gk1227
3 Replies
9. AIX
Hello,
We have an Power8 System (S822) and a IBM StorWize v3700 SAN.
The OS is AIX 7.1.
With this hardware from what I read I need to download/install special SDDPCM drivers, so I did (SDDPCM VERSION 2.6.6.0 (devices.sddpcm.71.rte).
I carved my volumes in the StorWize and presented to... (3 Replies)
Discussion started by: c3rb3rus
3 Replies
LEARN ABOUT OSF1
secconfig
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)