Sponsored Content
The Lounge What is on Your Mind? FYI: Stack Overflow... seems there's quite a revolt of sorts going on over there and everywhere. Post 303044484 by sea on Monday 24th of February 2020 06:16:10 AM
Old 02-24-2020
As Churchill said:
Those who trade security for freedom, deserve neither.
 

8 More Discussions You Might Find Interesting

1. BSD

stack overflow in function psync_status Abort (core dumped)

I am running Open BSD 3.8 (3.5 upgrade) on a Pent Pro. 200, 64 Megs Ram, Nvedia Vanta TNT 16 Megs, Realtech 8139 Nic. When running ifconfig -a I get this error back. I've run searches on google no deal. I can get Stack overflow or psync, but not both. So I would really like to know how to fix it. ... (0 Replies)
Discussion started by: jmcpreach
0 Replies

2. HP-UX

Problem with stack overflow

Hi, I get a problem with stack overflow on HP-UX, when running a C program. Pid 28737 received a SIGSEGV for stack growth failure. Possible causes: insufficient memory or swap space, or stack size exceeded maxssiz. The possible cause i found, was that the definition of a structure had... (0 Replies)
Discussion started by: karthikb23
0 Replies

3. AIX

IBM xlf "parser stack overflow" error

Hello, Does anybody know how to increase IBM xlf parser stack to get rid of the "parser stack overflow" error? Thanks Ping (1 Reply)
Discussion started by: luop0812
1 Replies

4. Shell Programming and Scripting

Create a script which sorts a file

I have a file below which has a list of users and roles with each row having unique combination of users and roles. USER1 ROLE1 USER1 ROLE2 USER2 USER3 ROLE1 USER3 ROLE2 USER3 ROLE3 USER4 ROLE2 .... .... I am trying to create a script which sorts the above file to have all the... (2 Replies)
Discussion started by: stevefox
2 Replies

5. Ubuntu

Stack overflow i guess while insmod

I have built kernel 2.6.35 on my Ubuntu system with some specific requirement. I also built some app defined module with the same kernel. I booted up the built version and I find it did not work properly as there is some gui and other modules missing problem. But the system booted up and I did... (0 Replies)
Discussion started by: sunilsukumar4u
0 Replies

6. UNIX for Dummies Questions & Answers

perform stack overflow

Help! I have an AIX system that has a power outage. When I logged in as root and got the system up and running it all looked ok. But.....when a user tries to log in they receive the error: The perform stack has overflowed OP=2117 PC=2124 E=46 in emmcshflif icrun is finished How can I fix... (1 Reply)
Discussion started by: dlegnar
1 Replies

7. AIX

Poll of sorts - on LDAP

1) Do you use LDAP on AIX? (as a client) 2) If yes, what LDAP server technology do you use: a) IDS (or ITDS) - IBM Tivoli Directory Server b) AD c) openLDAP d) other - please list. I ask, because I am looking at openLDAP as well as IDS and am wondering if there is a clear preference I... (4 Replies)
Discussion started by: MichaelFelt
4 Replies

8. Hardware

Stack Overflow Questions Tags Users Badges Unanswered Ask Question Ask for the explanation of types

I have read a document which tells me the following 4 things are done by the RAM embedded on disk driver controller. But I don't know what's difference between buffer and cache. Thanks! RAM on disk drive controllers 1 firmware 2 speed matching buffer 3 prefetching buffer 4 cache (1 Reply)
Discussion started by: 915086731
1 Replies
secconfig(8)						      System Manager's Manual						      secconfig(8)

NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security) SYNOPSIS
/usr/sbin/sysman secconfig NOTE: The secsetup utility has been replaced by the secconfig graphical interface. DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have loaded the enhanced security subsets. You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot the system. For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and to restrict the setting of the execute bit to root only. For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming, and password controls. When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con- vuser utility to migrate user accounts. While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths differ between base and enhanced security, and thus user account conversions do not succeed without a password change. NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect at the next reboot. FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8), Security delim off secconfig(8)
All times are GMT -4. The time now is 07:57 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy