Sponsored Content
Operating Systems Linux Ubuntu Obtaining an encrypted notebook/computer and prevent against infiltration Post 302982128 by fractal_bar on Saturday 24th of September 2016 04:08:47 PM
Old 09-24-2016
CPU & Memory Obtaining an encrypted notebook/computer and prevent against infiltration

Hej ––

I'm writing to explore the options on comparisons of commercial notebooks over encrypted notebooks which are offered online in the prevent and general protection against infiltration and 'hacks' and other 'obvious' methods into the system outside of security management techniques which deal with proper file and user management.
  • what are encrypted notebooks;
  • how are encrypted notebooks different then commercial counterparts; and
  • how is the running operating system managed and protected
Always ––
 

9 More Discussions You Might Find Interesting

1. IP Networking

Obtaining IP address

How can UNIX systems obtain IP addresses? Can it obtain from Win 2000 Server, DHCP service, dynamically? (1 Reply)
Discussion started by: Raael
1 Replies

2. UNIX for Advanced & Expert Users

Obtaining A Process ID (PID)

Is there any way I can get UNIX to return the Process ID of a process when I actually issue the command to invoke the process? For example, if I was to launch an emacs process in batch mode, by issuing the UNIX command : % emacs file.txt& then UNIX would return the Process ID (PID).... (7 Replies)
Discussion started by: 1cuervo
7 Replies

3. Programming

Obtaining Process information on AIX

I have written a program to collect some performance metrics on and AIX box, but I'm having difficultly getting the process information. I'm lead to believe that I'm not getting the correct information because I'm trying to run the program on AIX 5.1 (5100-03), but I'm not convinced as the... (0 Replies)
Discussion started by: StuBob
0 Replies

4. What is on Your Mind?

Obtaining Security Clearance

I'm looking to move down to the Baltimore, MD area and have been looking for a job for about a week. Many of the opportunities require some form of security clearance, because many of the jobs are government work. My question is how do I go about obtaining the proper clearance? I'm a U.S.... (6 Replies)
Discussion started by: dangral
6 Replies

5. Shell Programming and Scripting

obtaining a line number in ksh programming

Hi People, how do i obtain the line number of a ksh shell script that i am working on For example in C,when u key in __LINE__ will return u the current line number of the src code. regards wilson (1 Reply)
Discussion started by: wilsontan
1 Replies

6. Shell Programming and Scripting

obtaining a particular day

hello guys am totally new to this script programming so help me i want to write a script that obtain a particular day and schedule a task that day at particular time .. my problem is i don't know to get time and particular day in script ... 2. how i ll print the time taken by executing a... (2 Replies)
Discussion started by: johnray31
2 Replies

7. What is on Your Mind?

Which Notebook to buy

Hi Im not sure that i post that Thread here on the right place but i hope someone can help me. Im searching for a new Notebook with Linux or Unix as system. Im looking for a Notebook with the following components: Intel Core 2 for mobile min 2GB RAM 15 " Display none reflective ATI or NVidia... (6 Replies)
Discussion started by: MagicMike
6 Replies

8. IP Networking

Obtaining IP address from both my network interface

HI folks, I am developing a software which one of the module is to interchange the ip address of another active network interface's when making a socket connection. I would like to know whether there is any function call that would enable me to retrieve the ip address that is obtained by a... (2 Replies)
Discussion started by: citiz3n
2 Replies

9. Shell Programming and Scripting

Obtaining day before a given date

Hi all, is there a way using GNU (Solaris 8) methods of obtaining the day before a given day? i.e. 2007-09-09.... I would like the date a day before it so output would be 2007-09-08. Format YYYY-MM-DD I know I can subtract the day number using cut and expr but it would get tricky if the... (3 Replies)
Discussion started by: muay_tb
3 Replies
SHADOW(5)							File Formats Manual							 SHADOW(5)

NAME
shadow - encrypted password file DESCRIPTION
shadow contains the encrypted password information for user's accounts and optional the password aging information. Included is Login name Encrypted password Days since Jan 1, 1970 that password was last changed Days before password may be changed Days after which password must be changed Days before password is to expire that user is warned Days after password expires that account is disabled Days since Jan 1, 1970 that account is disabled A reserved field The password field must be filled. The encryped password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, . and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES) algorithm. For example if it starts with "$1$" it means the MD5-based algorithm was used. Refer to crypt(3) for details on how this string is interpreted. The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user. An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the pass- word expires. An account will also be disabled on the specified day regardless of other password expiration information. This information supercedes any password or password age information present in /etc/passwd. This file must not be readable by regular users if password security is to be maintained. FILES
/etc/passwd - user account information /etc/shadow - encrypted user passwords SEE ALSO
chage(1), login(1), passwd(1), su(1), passwd(5), pwconv(8), pwunconv(8), sulogin(8) AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com) SHADOW(5)
All times are GMT -4. The time now is 06:23 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy