Sponsored Content
Operating Systems Linux Customized Linux Operating System with Security Authentication Post 302944025 by isravelraja on Friday 15th of May 2015 01:56:20 AM
Old 05-15-2015
Lightbulb Customized Linux Operating System with Security Authentication

Dear Gurus/Experts of UNIX/LINUX,

Im Isravel from India, I've customized CentOS Installation ISO as per my new product requirements. I want to give serial key authentication to the clients who all are trying to install ISO file.

Can anyone guide me how to create serial key authentication during the installation.

I do really understand It's an open source, I have customized for new product testing and its not for sale. Its for free with new authentication option

Thank in Advance

Isravel
 

9 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Operating system LINUX

Write a C program that accepts 3 parameters. Each parameter indicates the quantity of product to be produced. Each product will be produced in different production line. Ready products will be placed in a buffer area located at the end of each production line. Packaging workers will pack the... (1 Reply)
Discussion started by: paradise
1 Replies

2. Homework & Coursework Questions

Operating system LINUX

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a C program that accepts 3 parameters. Each parameter indicates the quantity of product to be produced.... (1 Reply)
Discussion started by: paradise
1 Replies

3. Homework & Coursework Questions

Operating system LINUX

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: Write a C program that accepts 3 parameters. Each parameter indicates the quantity of product to be produced.... (0 Replies)
Discussion started by: paradise
0 Replies

4. UNIX for Advanced & Expert Users

Linux is kernel and solaris is operating system

Hi I was reading some weblog on the internet and someone made an interesting statement. <quote> Linux is kernel and solaris is operating system </quote> Honestly I don't understand the difference between term kernel and operating system in above quote. Could you explain me more ? thx... (4 Replies)
Discussion started by: presul
4 Replies

5. Ubuntu

establishing connection with e-kermit running on LINUX from my operating system

we designed a primitive operating system for learning basics fundamentals and we created process switching, interrupt/polled IO for device drivers like UART and printers. We accomplish this by using our own tools called SPEDE (for downloading compiled elf image from host ubuntu system that have... (0 Replies)
Discussion started by: bicepjai
0 Replies

6. Linux

Linux Operating system concepts

hi guys, i got job recently in a company which provide a product for data backup and data recovery... as dis product is wrriten in c++ am workin in c++.. now am under training and i want to learn abt Operating System concepts and OS programming using c and c++. i know basic c and c++ programming... (3 Replies)
Discussion started by: senthil.march
3 Replies

7. UNIX for Dummies Questions & Answers

How much take space Linux operating system?

Hi Guys, I have a PC (laptop), where ram is 1 GB, hard disk is 400 GB, Now in my PC has window7 & oracle 10g, suppose if we now installed linux then will my system work or we should remove window7 now, please let me know that which linux version is take less space in PC. (3 Replies)
Discussion started by: aaditya321
3 Replies

8. Cybersecurity

Two Factor Authentication – Best for the UNIX/Linux Server Security

The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today's enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary... (1 Reply)
Discussion started by: reve-secure
1 Replies

9. AIX

Need command to find missing operating system security patches

Hi, Need a command to find out Missing operating system patches for AIX 7.1 or a command to list down all installed patches. (1 Reply)
Discussion started by: Mona Khandelwal
1 Replies
WESTCOS-TOOL(1) 						   OpenSC tools 						   WESTCOS-TOOL(1)

NAME
westcos-tool - utility for manipulating data structures on westcos smart cards SYNOPSIS
westcos-tool [OPTIONS] DESCRIPTION
The westcos-tool utility is used to manipulate the westcos data structures on 2 Ko smart cards. Users can create PINs, keys and certificates stored on the token. User PIN authentication is performed for those operations that require it. OPTIONS
--reader, r num Use the given reader. The default is the first reader with a card. --wait, -w Wait for a card to be inserted --generate-key, -g Generate a private key on smart card. The smart card must be not finalized and a PIN must be installed (ie. file for PIN must be created, see option -i). By default key length is 1536 bits. User authentication is required for this operation. --overwrite-key, -o Overwrite the key if there is already a key on card. --key-length length, -l length Change the length of private key, use with -g. --install-pin, -i Install PIN file in token, you must provide PIN value with -x. --pin-value value, -x value set value of PIN. --puk-value value, -y value set value of PUK (or value of new PIN for change PIN command see -n). --change-pin, -n Changes a PIN stored on the token. User authentication is required for this operation. --unblock-pin, -u Unblocks a PIN stored on the token. Knowledge of the PIN Unblock Key (PUK) is required for this operation. --certificate file, -t file Write certificate file in PEM format to the card. User authentication is required for this operation. --finalize, -f Finalize the card. Once finalized the default key is invalidated so PIN and PUK can't be changed anymore without user authentication. Warning, un-finalized are insecure because PIN can be changed without user authentication (knowledge of default key is enough). --read-file path, -j path Get the file path the file is written on disk with path name. User authentication is required for this operation. --write-file path, -k path Put the file with name path from disk to card the file is written in path. User authentication is required for this operation. --help, -h Print help message on screen. -v Causes westcos-tool to be more verbose. Specify this flag several times to enable debug output in the OpenSC library. AUTHORS
westcos-tool was written by Francois Leblanc francois.leblanc@cev-sa.com. opensc 06/03/2012 WESTCOS-TOOL(1)
All times are GMT -4. The time now is 10:13 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy