Sponsored Content
Operating Systems Linux Red Hat Issues installing inotify-tools on RedHat Linux Post 303037556 by Neo on Tuesday 6th of August 2019 12:52:35 AM
Old 08-06-2019
Quote:
Originally Posted by Peasant
I did not mean not talking to anybody in security department and doing stuff in DIY mode Smilie
A simple proxy or tunnel for a one time operation should not classify as a security breach if communicated properly.

Regards
Peasant.
Hi Peasant,

Thanks for clarifying.

Yes, you might not have meant for the OP to break IT security policy; but that is not what you typed in your reply, so hence my post. I must insure people here at not advising users to break their organizations IT security policy, either accidentally, indirectly, or on purpose.

As the forum admin, your reply read to me like you were advising the original poster to use a proxy briefly to download software from the Internet. You did not mention anything about coordinating or asking permission from his IT security manager or his supervisor at his bank.

We are not here to advise people who work at banks and other organizations (with high risk management profiles and tight access controls in place) how to bypass their internal IT security.

mohtashims can easily discuss his options with his management and IT security team. I am sure they have their own policies on how to deal with this; and they can help him, as they should.

I'm closing this thread before others start accidentally or purposely advising mohtashims how to breach his bank's IT security access controls and policies to download software from the Internet at his work.

It is my job here to make these calls since I'm the forum admin and have the overall responsibility to insure we are not assisting people to violate company policies.

The correct answer to mohtashims is "go talk to your boss and IT security team".

Thanks for understanding.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Installing RedHat Linux 7

Hey everybody. Its been awhile since I last posted but in short I am now in posession of RedHat Linux 7.0 which I got from a book called the RedHat 7 Bible. As this is not an official distribution I cannot get product support from RedHat so I decided to try here. I have three computers. I... (2 Replies)
Discussion started by: TheGoof
2 Replies

2. UNIX for Dummies Questions & Answers

Installing driver in linux redhat... what am I doing wrong?

I am trying to install this driver: http://www.asus.com/support/download/selectftp.aspx?l1_id=1&l2_id=15&l3_id=15&m_id=1&f_name=5702_558.zip~zaqwedc hoping it will correct my problem with my ethernet card. I am following the instructions in the text file that came with download... it says to... (7 Replies)
Discussion started by: Minnesota Red
7 Replies

3. Ubuntu

Linux Redhat ES 4.0 - DNS Config Issues

Hello all, I've a very strange thing hapenning in my Sys, I've configured the IP, DNS eveything for my internat connection, but Im only able to browse Redhat.com websites. I cant open anyother site!!! :eek: Im sure the internet is configured 'coz it displays the list of avail updates for... (11 Replies)
Discussion started by: AbhijithS
11 Replies

4. Emergency UNIX and Linux Support

Installing packages on Redhat 5.5: rpmlib issues

Hi there I'm having trouble with a remote Red Hat server. We are busy with an Oracle 11g installation on this box and going through the list of required packages, etc. The installation required elfutils-libelf-devel-0.148. When I try to install that I get the following error; rpm -i... (6 Replies)
Discussion started by: notreallyhere
6 Replies

5. Red Hat

How to install expect after installing tcl on Redhat Linux

Hi, I have install tcl and then expect but I am getting below ouput while trying which expect which expect /usr/bin/which: no expect in (/usr/kerberos/sbin:/usr/kerberos/bin:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/X11R6/bin:/root/bin) I have copied both in... (6 Replies)
Discussion started by: manish_1678
6 Replies

6. Red Hat

RedHat Linux GUI Issues

hi all i have installed Windows 7 first. then i installed linux on dual partations... i am booting both of them through dual boot... but when i start linux its only working well with CUI, when i used commands like startx or changed the initd to 5 then its loading the GUI interface of RedHat... (9 Replies)
Discussion started by: Nikhil Dethe
9 Replies

7. Red Hat

Installing PHP tools using RPM in Redhat Linux

Hi there, I am trying to install few PHP tools in my Linux server by creating RPMs from source ( tar.gz) files. The issue here is that the tar.gz files does not have a configure file and so I am not able to do ./configure make install opertations. I tried downloading src.rpms of these tools,... (0 Replies)
Discussion started by: Vicky81
0 Replies

8. Shell Programming and Scripting

Issues installing RubyGems on Linux

Hi, I am getting error installing rubygems as shown below: $ pwd /ticket/tools/binaries/rubygems-2.6.12 $ sudo ruby setup.rb password for redmine: <internal:gem_prelude>:4:in `require': cannot load such file -- rubygems.rb (LoadError) from <internal:gem_prelude>:4:in... (0 Replies)
Discussion started by: mohtashims
0 Replies

9. Shell Programming and Scripting

Hotfolder with inotify-tools, loop FOR not working

I can not understand why this little script with a loop processes only one file. At boot in /etc/rc.local i wrote: /usr/local/bin/./myscript & This is myscript: #!/bin/bash while inotifywait -e create /HOTFOLDER/ ; do for fullname in /HOTFOLDER/*.xlsx; do if !... (22 Replies)
Discussion started by: pasaico
22 Replies
auths(1)							   User Commands							  auths(1)

NAME
auths - print authorizations granted to a user SYNOPSIS
auths [ user ...] DESCRIPTION
The auths command prints on standard output the authorizations that you or the optionally-specified user or role have been granted. Autho- rizations are rights that are checked by certain privileged programs to determine whether a user may execute restricted functionality. Each user may have zero or more authorizations. Authorizations are represented by fully-qualified names, which identify the organization that created the authorization and the functionality that it controls. Following the Java convention, the hierarchical components of an authorization are separated by dots (.), starting with the reverse order Internet domain name of the creating organization, and ending with the specific function within a class of authorizations. An asterisk (*) indicates all authorizations in a class. A user's authorizations are looked up in user_attr(4) and in the /etc/security/policy.conf file (see policy.conf(4)). Authorizations may be specified directly in user_attr(4) or indirectly through prof_attr(4). Authorizations may also be assigned to every user in the system directly as default authorizations or indirectly as default profiles in the /etc/security/policy.conf file. EXAMPLES
Example 1: Sample output The auths output has the following form: example% auths tester01 tester02 tester01 : solaris.system.date,solaris.jobs.admin tester02 : solaris.system.* example% Notice that there is no space after the comma separating the authorization names in tester01. EXIT STATUS
The following exit values are returned: 0 Successful completion. 1 An error occurred. FILES
/etc/user_attr /etc/security/auth_attr /etc/security/policy.conf /etc/security/prof_attr ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ SEE ALSO
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5) SunOS 5.10 25 Mar 2004 auths(1)
All times are GMT -4. The time now is 02:51 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy