07-23-2001
unix admire
hello,
i've been using microsot product especially in networking field. but, i found microsoft product aren't good enough for networks
security features. and now, is there anybody that could advice me
what security features Unix may offer me than microsoft. by the way, i'm working at billionaire organization at malaysia and my job currently are to secure this organization networks. please. i made a reading but it was just a theory for me. i need an experiences network security engineer. thanks.
czer
8 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Okee problems...!!
What is happening: Unix server with some programms, workstations are windows 2000, the workstations work good but when you start a programm on the Unix server the CPU of the workstations go to 100% usage resulting that the system gets very slow. The programm well its running so... (2 Replies)
Discussion started by: zerocool
2 Replies
2. UNIX for Dummies Questions & Answers
I tried looking for the answer online and came up with only a few semi-answers as to why file and directory names are case sensitive in Unix. Right off the bat, I'll say this doesn't bother me. But I run into tons of Windows and OpenVMS admins in my day job who go batty when they have to deal... (3 Replies)
Discussion started by: deckard
3 Replies
3. UNIX for Advanced & Expert Users
hi
i want run an unix application from a windows program/application.i am using SSH(command line version)to log on to a unix machine from windows. the application has to read a configuration file inorder to run. the configuration file .CFG is in bin in my home directory. but the application... (1 Reply)
Discussion started by: megastar
1 Replies
4. Shell Programming and Scripting
Hi,
My local server is :/usr/abcd/
Remote server is :/Usr/host/test/
I want to send files from local unix directory(All files starting with O_999) to
remote host unix directory.
Can any body give me the Unix Shell script to do this.
One more doubt: Shall we need to change the file... (1 Reply)
Discussion started by: raja_1234
1 Replies
5. Shell Programming and Scripting
Hi Experts,
I have a requirement where i need to setup a batch job which runs everymonth and move the pdf files from unix server to windows servers.
Could some body provide the inputs for this.
and also please provide the inputs on how to map the network dirve in the unix like that... (1 Reply)
Discussion started by: ger199901
1 Replies
6. UNIX for Dummies Questions & Answers
How does unix system administration, unix programming, unix network programming differ?
Please help. (0 Replies)
Discussion started by: thulasidharan2k
0 Replies
7. Shell Programming and Scripting
Dear All,
Can someone help to command or program to transfer the file from windows to Unix server and from one unix server to another Unix server in secure way.
I would request no samba client. (4 Replies)
Discussion started by: yadavricky
4 Replies
8. Post Here to Contact Site Administrators and Moderators
We work hard to make The UNIX and Linux Forums one of the best UNIX and Linux knowledge sources on the net. The site is certainly one of the top UNIX and Linux Q&A sites on the web. In order to provide certain members the best quality account services, you can now get some great extra features by... (2 Replies)
Discussion started by: Neo
2 Replies
LEARN ABOUT OSF1
secsetup
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)