09-24-2016
Obtaining an encrypted notebook/computer and prevent against infiltration
Hej ––
I'm writing to explore the options on comparisons of commercial notebooks over encrypted notebooks which are offered online in the prevent and general protection against infiltration and 'hacks' and other 'obvious' methods into the system outside of security management techniques which deal with proper file and user management.
- what are encrypted notebooks;
- how are encrypted notebooks different then commercial counterparts; and
- how is the running operating system managed and protected
Always ––
9 More Discussions You Might Find Interesting
1. IP Networking
How can UNIX systems obtain IP addresses? Can it obtain from Win 2000 Server, DHCP service, dynamically? (1 Reply)
Discussion started by: Raael
1 Replies
2. UNIX for Advanced & Expert Users
Is there any way I can get UNIX to return the Process ID of a process when I actually issue the command to invoke the process?
For example, if I was to launch an emacs process in batch mode, by issuing the UNIX command :
% emacs file.txt&
then UNIX would return the Process ID (PID).... (7 Replies)
Discussion started by: 1cuervo
7 Replies
3. Programming
I have written a program to collect some performance metrics on and AIX box, but I'm having difficultly getting the process information.
I'm lead to believe that I'm not getting the correct information because I'm trying to run the program on AIX 5.1 (5100-03), but I'm not convinced as the... (0 Replies)
Discussion started by: StuBob
0 Replies
4. What is on Your Mind?
I'm looking to move down to the Baltimore, MD area and have been looking for a job for about a week. Many of the opportunities require some form of security clearance, because many of the jobs are government work.
My question is how do I go about obtaining the proper clearance? I'm a U.S.... (6 Replies)
Discussion started by: dangral
6 Replies
5. Shell Programming and Scripting
Hi People,
how do i obtain the line number of a ksh shell script that i am working on For example in C,when u key in __LINE__ will return u the current line number of the src code.
regards
wilson (1 Reply)
Discussion started by: wilsontan
1 Replies
6. Shell Programming and Scripting
hello guys am totally new to this script programming so help me
i want to write a script that obtain a particular day and schedule a task that day at particular time .. my problem is i don't know to get time and particular day in script ...
2.
how i ll print the time taken by executing a... (2 Replies)
Discussion started by: johnray31
2 Replies
7. What is on Your Mind?
Hi Im not sure that i post that Thread here on the right place but i hope someone can help me.
Im searching for a new Notebook with Linux or Unix as system.
Im looking for a Notebook with the following components:
Intel Core 2 for mobile
min 2GB RAM
15 " Display none reflective
ATI or NVidia... (6 Replies)
Discussion started by: MagicMike
6 Replies
8. IP Networking
HI folks,
I am developing a software which one of the module is to interchange the ip address of another active network interface's when making a socket connection.
I would like to know whether there is any function call that would enable me to retrieve the ip address that is obtained by a... (2 Replies)
Discussion started by: citiz3n
2 Replies
9. Shell Programming and Scripting
Hi all,
is there a way using GNU (Solaris 8) methods of obtaining the day before a given day?
i.e. 2007-09-09.... I would like the date a day before it so output would be 2007-09-08. Format YYYY-MM-DD
I know I can subtract the day number using cut and expr but it would get tricky if the... (3 Replies)
Discussion started by: muay_tb
3 Replies
SHADOW(5) File Formats Manual SHADOW(5)
NAME
shadow - encrypted password file
DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is
Login name
Encrypted password
Days since Jan 1, 1970 that password was last changed
Days before password may be changed
Days after which password must be changed
Days before password is to expire that user is warned
Days after password expires that account is disabled
Days since Jan 1, 1970 that account is disabled
A reserved field
The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru
Z, 0 thru 9, . and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES)
algorithm. For example if it starts with "$1$" it means the MD5-based algorithm was used.
Refer to crypt(3) for details on how this string is interpreted.
The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the
proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater
than the maximum number of day allowed, this password may not be changed by the user.
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass-
word expires. An account will also be disabled on the specified day regardless of other password expiration information.
This information supercedes any password or password age information present in /etc/passwd.
This file must not be readable by regular users if password security is to be maintained.
FILES
/etc/passwd - user account information
/etc/shadow - encrypted user passwords
SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8)
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
SHADOW(5)