11-07-2016
Short answer: No.
Long answer: Obscurity is not security. ps is not a security tool. Even if you convinced ps to block the information, users could just get it direct from the source in /proc/####/comm.
Do you know for a fact that the first 80 chars never contains sensitive information, anyway? Commandline arguments were never a particularly safe place to put such things.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have got a file BeforeSort.txt having 40 fields seperated by "|"
First field= RecordType (Value will be P or FP)
Second field= CamCode
Third field = UpdatingDate
Fourth field = ProductType
Fifth field = ActionCode (Value may be 01, 02 or 03)
Sixth field = ProductCode
and so on
My... (1 Reply)
Discussion started by: pankajrai
1 Replies
2. UNIX for Advanced & Expert Users
Hi guys,
I have the following example data:
A;00:00:19
B;00:01:02
C;00:00:13
D;00:00:16
E;00:02:27
F;00:00:12
G;00:00:21
H;00:00:19
I;00:00:13
J;00:13:22
I run the following sort against it, yet the output is as follows:
sort -t";" +1 -nr example_data.dat
A;00:00:19 (16 Replies)
Discussion started by: miwinter
16 Replies
3. Shell Programming and Scripting
I have a variable, defndata, which is a number (fetched from a file using awk).
I want that if defndata is not initialized (that is its not found in the file using awk), then to execute a block of statements, otherwise execute another block.
if
then
....
else
...
fi
Now this... (4 Replies)
Discussion started by: indianjassi
4 Replies
4. Shell Programming and Scripting
i 've noticed the following difference between freebsd cp and gnu cp
from the freebsd cp man page:
-R ... If the source_file ends in a /, the contents of the directory are copied rather than
the directory itself. ...
on gnu cp from the man pagewhile on gnu cp manpage:
‘-r'... (2 Replies)
Discussion started by: aegis
2 Replies
5. Shell Programming and Scripting
Hi
I am using "trap" command in my script to prevent the user from running Ctrl-C during the its execution. My script creates number of children processes which in turn create some children processes as well during the execution.
When user / tester tries to run Ctrl-C, the parent process is... (1 Reply)
Discussion started by: aoussenko
1 Replies
6. Shell Programming and Scripting
Hi,
Suppose if I have a file having data like this:
$ cat file.txt
A
B C
D
And, if I do a cut operation like this:
$ cut -d" " -f2 file.txt
The output is
A
C
D
This is the same for even if we try to get the field 3 with -f3 (assume line 2 has 3 fields : C E F).
The above... (1 Reply)
Discussion started by: royalibrahim
1 Replies
7. Programming
fg = foreground bg = background
I have a cobol program that I start with a very simple script.
The script is not at fault as it has not changed and the program worked in fg and bg before.
I have altered the logging in the program and moved my cursor declare to working storage.
The program runs... (6 Replies)
Discussion started by: Bruble
6 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I'm trying to understand why the find command below is not listing a directory which was modified long back from the number of days specified in the mtime part. :confused:
user-aster :/mydir
$ ls -ld 1607570a-4fed44bb-4988
drwxr-xr-x 3 xyz abc 4096 Jun 29 01:02 1607570a-4fed44bb-4988... (4 Replies)
Discussion started by: aster007
4 Replies
9. Shell Programming and Scripting
Hello All,
I came across this line in a shell script that I was looking at yesterday. Couldn't get a clue of what it does. :confused:
....
....
blah blah
....
.....
exec >&- 2>&-
......
blah blah
.....
Can someone explain me this??
Usually I have seen exec commands used to... (3 Replies)
Discussion started by: PikK45
3 Replies
10. Shell Programming and Scripting
I have a script as below.
bash-3.00$ cat test.sh
#!/usr/bin/ksh
path=`pwd`
echo $path
var=$path/temp11
echo $var
If run it is giving output
bash-3.00$ ksh test.sh
//var/tmp/SB2/miscellaneous
//var/tmp/SB2/miscellaneous/temp11 (5 Replies)
Discussion started by: millan
5 Replies
LEARN ABOUT ULTRIX
secsetup
secsetup(8) System Manager's Manual secsetup(8)
Name
secsetup - enable the enhanced security features
Syntax
/usr/etc/sec/secsetup
Description
The command is an interactive facility that allows you to enable the enhanced security features on your system. You must first have loaded
the enhanced security subset onto your system before running the command.
The command allows you to configure your system either for security auditing, trusted path, enhanced login, or any combination of those
features. In addition, the command may add lines to the file. To remove entries from the you must edit it by hand. The command only adds
lines to this file if they aren't already present. You can run while the system is in multiuser mode (however, some inconsistencies may
result from this. See the Security Guide for Administrators for more information). To run type the following and then answer the ques-
tions that follow:
# /usr/etc/sec/secsetup
Depending on the security features chosen, when completes you may need to replace your system's kernel and reboot the system. For example,
chosing either the security auditing or trusted path feature may require you to re-build your kernel.
Files
See Also
set_audit_mask(8), auth(5), svc.conf(5)
Security Guide for Administrators
secsetup(8)