08-06-2019
I did not mean not talking to anybody in security department and doing stuff in DIY mode
A simple proxy or tunnel for a one time operation should not classify as a security breach if communicated properly.
Regards
Peasant.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hey everybody. Its been awhile since I last posted but in short I am now in posession of RedHat Linux 7.0 which I got from a book called the RedHat 7 Bible. As this is not an official distribution I cannot get product support from RedHat so I decided to try here.
I have three computers. I... (2 Replies)
Discussion started by: TheGoof
2 Replies
2. UNIX for Dummies Questions & Answers
I am trying to install this driver: http://www.asus.com/support/download/selectftp.aspx?l1_id=1&l2_id=15&l3_id=15&m_id=1&f_name=5702_558.zip~zaqwedc hoping it will correct my problem with my ethernet card. I am following the instructions in the text file that came with download...
it says to... (7 Replies)
Discussion started by: Minnesota Red
7 Replies
3. Ubuntu
Hello all,
I've a very strange thing hapenning in my Sys, I've configured the IP, DNS eveything for my internat connection, but Im only able to browse Redhat.com websites.
I cant open anyother site!!! :eek:
Im sure the internet is configured 'coz it displays the list of avail updates for... (11 Replies)
Discussion started by: AbhijithS
11 Replies
4. Emergency UNIX and Linux Support
Hi there
I'm having trouble with a remote Red Hat server. We are busy with an Oracle 11g installation on this box and going through the list of required packages, etc.
The installation required elfutils-libelf-devel-0.148. When I try to install that I get the following error;
rpm -i... (6 Replies)
Discussion started by: notreallyhere
6 Replies
5. Red Hat
Hi,
I have install tcl and then expect but I am getting below ouput while trying which expect
which expect
/usr/bin/which: no expect in (/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/root/bin)
I have copied both in... (6 Replies)
Discussion started by: manish_1678
6 Replies
6. Red Hat
hi all
i have installed Windows 7 first. then i installed linux on dual partations...
i am booting both of them through dual boot... but when i start linux its only working well with CUI, when i used commands like startx or changed the initd to 5 then its loading the GUI interface of RedHat... (9 Replies)
Discussion started by: Nikhil Dethe
9 Replies
7. Red Hat
Hi there,
I am trying to install few PHP tools in my Linux server by creating RPMs from source ( tar.gz) files. The issue here is that the tar.gz files does not have a configure file and so I am not able to do
./configure
make
install
opertations. I tried downloading src.rpms of these tools,... (0 Replies)
Discussion started by: Vicky81
0 Replies
8. Shell Programming and Scripting
Hi,
I am getting error installing rubygems as shown below:
$ pwd
/ticket/tools/binaries/rubygems-2.6.12
$ sudo ruby setup.rb
password for redmine:
<internal:gem_prelude>:4:in `require': cannot load such file -- rubygems.rb (LoadError)
from <internal:gem_prelude>:4:in... (0 Replies)
Discussion started by: mohtashims
0 Replies
9. Shell Programming and Scripting
I can not understand why this little script with a loop processes only one file.
At boot in /etc/rc.local i wrote:
/usr/local/bin/./myscript &
This is myscript:
#!/bin/bash
while inotifywait -e create /HOTFOLDER/ ; do
for fullname in /HOTFOLDER/*.xlsx; do
if !... (22 Replies)
Discussion started by: pasaico
22 Replies
LEARN ABOUT OSF1
secconfig
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)