Sponsored Content
Special Forums Cybersecurity How to protect system from cloning? Post 302916224 by rbatte1 on Monday 8th of September 2014 09:46:24 AM
Old 09-08-2014
How will you manage if the disk fails, the server needs a replacement motherboard, NIC etc. or you have a full disaster situation? If you generate a working solution that allows for these, then you have created a back-door that others might exploit.

Are you concerned that the server may be physically attacked in some way?



Robin
This User Gave Thanks to rbatte1 For This Post:
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

protect dtterm

we have an hp-ux and a user requested me if i can password protect the dtterm. i know that this is possible but can you give me some hints in making this happen? thanks :cool: (2 Replies)
Discussion started by: inquirer
2 Replies

2. UNIX for Dummies Questions & Answers

Password protect a file

I have created a PHP page that I use to clean files on my machine. I would like to leave the file there but I want to password protect it so that I am the only one that can run it from the shell. Does anyone know how to do this? Thanks. -Cam (2 Replies)
Discussion started by: perryl7
2 Replies

3. UNIX for Advanced & Expert Users

Protect from rm /

We recently had an accidental delete from /. I hold the root password but others are allowed to sudo over to root to perform admin tasks. The only way I want to permit deletion from / is by physically being root (su -). I'd like to add a line to the sudoers file which would permit all commands... (1 Reply)
Discussion started by: scottsl
1 Replies

4. AIX

Problem cloning system

Hi everyone, I want to clone a AIX 5.2 system from a machine to another one. So i modified bosinst.data and image.data files (according to future platform) before making mksysb on old platform. After booting on CD and restoring system using mksysb tape, the installation is launched but ever... (2 Replies)
Discussion started by: fgaulois
2 Replies

5. UNIX for Dummies Questions & Answers

Full System Backup / Cloning HPUX

I am new to UNIX and need help in cloning a HPUX 10.2 Ace 5, can anybody please guide me in making a full system backup. Real Chess (0 Replies)
Discussion started by: real-chess
0 Replies

6. UNIX for Advanced & Expert Users

Cloning a solaris system

I have several Solaris 8,9 and 10 servers. I need to refresh them and avoid doing any OS upgrades. I may have to apply patches when I am done due to the new hardware. My current servers have internal disk and my new target servers (same processor types) will have only SAN storage. Once the... (0 Replies)
Discussion started by: zzqv9p
0 Replies

7. UNIX for Advanced & Expert Users

protect process

how to protect my process from others to kill?? Double post, continued here, thread closed (0 Replies)
Discussion started by: samrintu
0 Replies

8. AIX

Cloning a system via mksysb backup from one system and restore to new system

Hello All, I am trying to clone an entire AIX virtual machine to a new virtual machine including all partitions and OS.Can anyone help me on the procedure to follow? I am not really sure on how it can be done.Thanks in advance. Please use CODE tags for sample input, sample output, and for code... (4 Replies)
Discussion started by: gull05
4 Replies

9. Solaris

Archiveadm system cloning - Solaris 11.4

Hi all, I am trying to use archiveadm to backup/clone an existing Solaris11.4 system. However, i failed at media creation with the error -> "Media can only be created from archives containing root-only data" root@xxx:/mnt/opt/software# zpool list NAME SIZE ALLOC FREE CAP DEDUP ... (6 Replies)
Discussion started by: javanoob
6 Replies
PROTECT(1)						    BSD General Commands Manual 						PROTECT(1)

NAME
protect -- protect processes from being killed when swap space is exhausted SYNOPSIS
protect [-i] command protect [-cdi] -g pgrp | -p pid DESCRIPTION
The protect command is used to mark processes as protected. The kernel does not kill protected processes when swap space is exhausted. Note that this protected state is not inherited by child processes by default. The options are: -c Remove protection from the specified processes. -d Apply the operation to all current children of the specified processes. -i Apply the operation to all future children of the specified processes. -g pgrp Apply the operation to all processes in the specified process group. -p pid Apply the operation to the specified process. command Execute command as a protected process. Note that only one of the -p or -g flags may be specified when adjusting the state of existing processes. EXIT STATUS
The protect utility exits 0 on success, and >0 if an error occurs. EXAMPLES
Mark the Xorg server as protected: pgrep Xorg | xargs protect -p Protect all ssh sessions and their child processes: pgrep sshd | xargs protect -dip Remove protection from all current and future processes: protect -cdi -p 1 SEE ALSO
procctl(2) BUGS
If you protect a runaway process that allocates all memory the system will deadlock. BSD
September 19, 2013 BSD
All times are GMT -4. The time now is 09:33 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy