12-12-2013
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I use telent or netterm to remotely login onto a linux sever, but I could only use the command-line interface. I want to know how can I use the graphical interface such as KDE or GNOME.
Thanks a lot.:p (3 Replies)
Discussion started by: guanglei_li
3 Replies
2. UNIX for Dummies Questions & Answers
While trying to install mandrake I click graphical install and the screen turns black ... why is it doing this?
Here is what is going on ...
I downloaded caldera, but i didn't know how to install it so I borrowed mandrake disks from a friend. I installed mandrake but in the middle there was... (11 Replies)
Discussion started by: OOnegative
11 Replies
3. Shell Programming and Scripting
Hi, I am i new Unix linux user. I've installed the linux 9 and i uninstall it. the first time i install the linux, the GRUB show the graphical interface. But after i reinstall it again, the GRUB change to command line. I can't boot my comp now. What should I do? And i don't know how to deal with... (1 Reply)
Discussion started by: lee_chongeu
1 Replies
4. Linux
Hi, I am i new Unix linux user. I've installed the linux 9 and i uninstall it. the first time i install the linux, the GRUB show the graphical interface. But after i reinstall it again, the GRUB change to command line. I can't boot my comp now. What should I do? And i don't know how to deal with... (4 Replies)
Discussion started by: lee_chongeu
4 Replies
5. BSD
Hi !
I have a question... how can I make a program with a graphical interface in C ? I googled a little bit to see how can I do it, but I realised that almost everything (Qt, KDE, etc) is using C++ for graphical programming. Is there any chance to programm a user interface in C ? If it is, please... (3 Replies)
Discussion started by: Sergiu-IT
3 Replies
6. Shell Programming and Scripting
Hi,
(please don't move this question, as it refers to graphical animation solution, using shell scripts and a number of known graphical objects
and using of foreground and background process switch control shell scripts to get objects with refresh/ animation effect).
I will provide you with... (0 Replies)
Discussion started by: jack2
0 Replies
7. Ubuntu
Hello everyone,
After installing Ubuntu 8.10 from DVD the Operating System boots into text mode. How do I get the graphical user environment to load.
The DVD includes a live/install that holds Intrepid Ibex (8.10)
Thanks in advance for the help,
Dirk (1 Reply)
Discussion started by: Dirk_
1 Replies
8. Debian
Hi, i have problems with an installation of Debian i386 505 in a pc. The hardware it is a mother soyo with a chipset via.
When i install the xorg, the installation it`s succesfull, but when i type startx, the pc don`t respond.
I am from Argentina and my English it isn`t good. Sorry. (0 Replies)
Discussion started by: Kritar
0 Replies
9. Solaris
I installed Oracle 10 software on Solaris 11 Express, everything was fine execpt I can't create database using dbca.rsp file. I populated file with following options.
OPERATION_TYPE = "createDatabase"
GDBNAME = "solaris_user.domain.com"
SID = "solaris_user"
TEMPLATENAME = "General... (0 Replies)
Discussion started by: solaris_user
0 Replies
10. AIX
Hello,
Please help me with a script with which I can check long running processes on the database server and the os is AIX.
Best regards,
Vishal (5 Replies)
Discussion started by: Vishal_dba
5 Replies
LEARN ABOUT OSF1
secconfig
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)