11-05-2015
8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hello people,
In shell scripts if some sensitive data is set into the env so that it is available to other scripts called within those scripts -- Are there are security implications ?
-- I believe the scope of those environment variables ends with the execution of the script.
-- I see that... (4 Replies)
Discussion started by: tipsy
4 Replies
2. UNIX for Advanced & Expert Users
All,
I'm hoping someone can help fill me in on this one.
:confused:
I work with bank data deemed "sensitive" and, once processed, need to figure out a way to overwrite the files with enough garbage data in order to prevent someone from being able to recover any of the data from the disk. I... (5 Replies)
Discussion started by: peteroc
5 Replies
3. Post Here to Contact Site Administrators and Moderators
I have posted some data on the forum which needs to be deletd ASAP.
The post here in question are
How to do in this in shell script?
How to modify this script?
How to resolve this error?
Error in code in linux?
Please remove all the parts from post :
i-d4411185 ... (6 Replies)
Discussion started by: Palak Sharma
6 Replies
4. Post Here to Contact Site Administrators and Moderators
Hello,
Can you please delete or modify a post that contains sensitive data. I can't post full links, here's the end of the link: shell-programming-and-scripting/94965-help-shell-scripting-modify-user-creation-script-oracle-database.html
It's got a lot of data that should never be posted on... (2 Replies)
Discussion started by: JonHeller
2 Replies
5. Post Here to Contact Site Administrators and Moderators
HI Sir ,
please remove the sensitive data from the post
https://www.unix.com/unix-for-advanced-and-expert-users/200219-ssh-issue.html
please blank the following terms
/home/infafi/Informatica/PowerCenter8.1.1/server/bin
iminfu01uat
... (4 Replies)
Discussion started by: ptappeta
4 Replies
6. Post Here to Contact Site Administrators and Moderators
Hi Sir,
please remove following terms from post as it is sensitive data
https://www.unix.com/shell-programming-and-scripting/235655-print-single-line.html
ifeeds
fidedev
ironsides
feedmgr
thanks a lot
prabhu (1 Reply)
Discussion started by: ptappeta
1 Replies
7. Post Here to Contact Site Administrators and Moderators
Hi
Kindly remove the following from the post . These are confidential info posted by mistake
https://www.unix.com/shell-programming-and-scripting/201037-perl-while-loop-each.html
please remove the comments section which is first 16 lines in the perl script .
Also please remove the ... (1 Reply)
Discussion started by: ptappeta
1 Replies
8. Post Here to Contact Site Administrators and Moderators
In this thread: /shell-programming-and-scripting/255687-organizing-text-file-capital-names-capital-word-capital-word.html (sorry i cant use links)
that is not an example, those are real students names with real student login id's for the college i am attending and i am on that list. Please... (3 Replies)
Discussion started by: throwawayacc
3 Replies
LEARN ABOUT HPUX
gss_verify_mic
gss_verify_mic(3) Library Functions Manual gss_verify_mic(3)
NAME
gss_verify_mic() - check a cryptographic message integrity code (MIC) against a message to verify its integrity
SYNOPSIS
DESCRIPTION
The routine verifies that a cryptographic MIC, contained in the token_buffer parameter, fits the supplied message. The application receiv-
ing the message can use the qop_state parameter to check the strength of protection.
Input Parameters
context_handle Specifies the context on which the message arrived.
message_buffer Specifies the message to be verified.
token_buffer Specifies the token to be associated with the message.
Output Parameters
qop_state Returns the quality of protection gained from message integrity code (MIC). Specify NULL if not required.
minor_status Returns a status code from the security mechanism.
STATUS CODES
The following status codes can be returned:
The routine was completed successfully.
The token failed consistency checks.
The MIC was incorrect.
The token was valid, and contained a correct
MIC for the message, but it had already been processed.
The token was valid, and contained a correct
MIC for the message, but it is too old.
The token was valid, and contained a correct MIC
for the message, but has been verified out of sequence. A later token has already been received.
The token was valid, and contained a correct MIC
for the message, but has been verified out of sequence. An earlier expected token has not yet been received.
The context has already expired.
The routine failed. Check the
minor_status parameter for details.
The context identified in the
context_handle parameter was not valid.
AUTHOR
was developed by Sun Microsystems, Inc.
SEE ALSO
gss_get_mic(3), gss_wrap(3).
The manpages for DCE-GSSAPI are included with the DCE-CoreTools product. To see those manpages add to
gss_verify_mic(3)