Sponsored Content
Operating Systems Linux Red Hat Issues installing inotify-tools on RedHat Linux Post 303037554 by Neo on Tuesday 6th of August 2019 12:27:25 AM
Old 08-06-2019
No... this is not correct per IT security policy:

Quote:
Originally Posted by Peasant

....

Other then that a simple squid proxy for couple of minutes should not be a security breach of any kind.
You can turn off the squid proxy and power off it after the action is completed.
There is also an option to tunnel via ssh.

Hope that helps
Regards
Peasant.
An employee cannot bypass security using a proxy at a major bank as an employee to bypass access controls set up by the bank without being in violation of internal bank policies.

mohtashims must follow his bank's IT security policies and not "turn on proxies" or do anything to bypass security without working with his supervisor and his IT security team to insure he has his organizations permission to do so.

When "you" are a system admin on a platform, you must follow company policy. If mohtashims does not have network access; he also may not have permission to install outside software.

I have worked as a system admin and also in IT security at a number of banks and other organizations with a similar risk management profile. Most of these organizations do not permit employees to go to the web, download and install tools from the Internet. This is why they block developers and system admins from access.

We are not here at unix.com to advise anyone to break their company IT security policies, directly or indirectly. We are here to advise them NOT to break their company rules and policies.

mohtashims should go to his IT security staff and his supervisor and find a way under banking IT security policies to install the software he wishes to install at his work.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Installing RedHat Linux 7

Hey everybody. Its been awhile since I last posted but in short I am now in posession of RedHat Linux 7.0 which I got from a book called the RedHat 7 Bible. As this is not an official distribution I cannot get product support from RedHat so I decided to try here. I have three computers. I... (2 Replies)
Discussion started by: TheGoof
2 Replies

2. UNIX for Dummies Questions & Answers

Installing driver in linux redhat... what am I doing wrong?

I am trying to install this driver: http://www.asus.com/support/download/selectftp.aspx?l1_id=1&l2_id=15&l3_id=15&m_id=1&f_name=5702_558.zip~zaqwedc hoping it will correct my problem with my ethernet card. I am following the instructions in the text file that came with download... it says to... (7 Replies)
Discussion started by: Minnesota Red
7 Replies

3. Ubuntu

Linux Redhat ES 4.0 - DNS Config Issues

Hello all, I've a very strange thing hapenning in my Sys, I've configured the IP, DNS eveything for my internat connection, but Im only able to browse Redhat.com websites. I cant open anyother site!!! :eek: Im sure the internet is configured 'coz it displays the list of avail updates for... (11 Replies)
Discussion started by: AbhijithS
11 Replies

4. Emergency UNIX and Linux Support

Installing packages on Redhat 5.5: rpmlib issues

Hi there I'm having trouble with a remote Red Hat server. We are busy with an Oracle 11g installation on this box and going through the list of required packages, etc. The installation required elfutils-libelf-devel-0.148. When I try to install that I get the following error; rpm -i... (6 Replies)
Discussion started by: notreallyhere
6 Replies

5. Red Hat

How to install expect after installing tcl on Redhat Linux

Hi, I have install tcl and then expect but I am getting below ouput while trying which expect which expect /usr/bin/which: no expect in (/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/root/bin) I have copied both in... (6 Replies)
Discussion started by: manish_1678
6 Replies

6. Red Hat

RedHat Linux GUI Issues

hi all i have installed Windows 7 first. then i installed linux on dual partations... i am booting both of them through dual boot... but when i start linux its only working well with CUI, when i used commands like startx or changed the initd to 5 then its loading the GUI interface of RedHat... (9 Replies)
Discussion started by: Nikhil Dethe
9 Replies

7. Red Hat

Installing PHP tools using RPM in Redhat Linux

Hi there, I am trying to install few PHP tools in my Linux server by creating RPMs from source ( tar.gz) files. The issue here is that the tar.gz files does not have a configure file and so I am not able to do ./configure make install opertations. I tried downloading src.rpms of these tools,... (0 Replies)
Discussion started by: Vicky81
0 Replies

8. Shell Programming and Scripting

Issues installing RubyGems on Linux

Hi, I am getting error installing rubygems as shown below: $ pwd /ticket/tools/binaries/rubygems-2.6.12 $ sudo ruby setup.rb password for redmine: <internal:gem_prelude>:4:in `require': cannot load such file -- rubygems.rb (LoadError) from <internal:gem_prelude>:4:in... (0 Replies)
Discussion started by: mohtashims
0 Replies

9. Shell Programming and Scripting

Hotfolder with inotify-tools, loop FOR not working

I can not understand why this little script with a loop processes only one file. At boot in /etc/rc.local i wrote: /usr/local/bin/./myscript & This is myscript: #!/bin/bash while inotifywait -e create /HOTFOLDER/ ; do for fullname in /HOTFOLDER/*.xlsx; do if !... (22 Replies)
Discussion started by: pasaico
22 Replies
auths(1)                                                           User Commands                                                          auths(1)

NAME
auths - print authorizations granted to a user SYNOPSIS
auths [ user ...] DESCRIPTION
The auths command prints on standard output the authorizations that you or the optionally-specified user or role have been granted. Autho- rizations are rights that are checked by certain privileged programs to determine whether a user may execute restricted functionality. Each user may have zero or more authorizations. Authorizations are represented by fully-qualified names, which identify the organization that created the authorization and the functionality that it controls. Following the Java convention, the hierarchical components of an authorization are separated by dots (.), starting with the reverse order Internet domain name of the creating organization, and ending with the specific function within a class of authorizations. An asterisk (*) indicates all authorizations in a class. A user's authorizations are looked up in user_attr(4) and in the /etc/security/policy.conf file (see policy.conf(4)). Authorizations may be specified directly in user_attr(4) or indirectly through prof_attr(4). Authorizations may also be assigned to every user in the system directly as default authorizations or indirectly as default profiles in the /etc/security/policy.conf file. EXAMPLES
Example 1: Sample output The auths output has the following form: example% auths tester01 tester02 tester01 : solaris.system.date,solaris.jobs.admin tester02 : solaris.system.* example% Notice that there is no space after the comma separating the authorization names in tester01. EXIT STATUS
The following exit values are returned: 0 Successful completion. 1 An error occurred. FILES
/etc/user_attr /etc/security/auth_attr /etc/security/policy.conf /etc/security/prof_attr ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ SEE ALSO
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5) SunOS 5.10 25 Mar 2004 auths(1)
All times are GMT -4. The time now is 06:44 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy