Sponsored Content
Full Discussion: Unix Security
Special Forums Cybersecurity Unix Security Post 43680 by kduffin on Thursday 20th of November 2003 09:51:11 PM
Old 11-20-2003
I think that it is important to look at the security from more than just a host perspective. Let's harden the system and drop a HIDS (Host based IDS), but also not forget watching our network as well. I've used Snort and the front end ACID with good success.

http://www.snort.org
http://www.andrew.cmu.edu/~rdanyliw/...snortacid.html

Keith
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Unix Security and auditing

I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
Discussion started by: GW01
3 Replies

2. UNIX Desktop Questions & Answers

Basic Unix Security

Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level) Thanks Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies

3. UNIX Desktop Questions & Answers

Unix Security

Sorry, Unix file security Thanks (1 Reply)
Discussion started by: DuttO
1 Replies

4. HP-UX

unix security

Was wondering if anyone could answer two quick questions... 1) What is the best way to impliment password triviality checking and also checking to make sure a user does not use the same password twice. 2) is there any nice software out there to manage users on multiple machine as far as security... (6 Replies)
Discussion started by: breigner
6 Replies

5. UNIX for Dummies Questions & Answers

Security in Unix - Documentation

Hello, I'm trying to find a Unix documentation about security! I mean I nead something very complex and complete, not just a document about kerberos, a document about securing against atack ... or others like those. I woulde like if exists, a documentation based on levels of security and expanding... (1 Reply)
Discussion started by: octav
1 Replies

6. UNIX for Dummies Questions & Answers

Unix/Linux security

Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually. Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies

7. UNIX for Dummies Questions & Answers

Unix vs Windows security

Hi to all, Asking which of the Unix and Windows platform is better may sound stupid...! But may I know what are the major differences between Unix and Windows in terms of security (authentication, access control, and complexity vs simplicit)? In which ways Unix does better than windows and... (1 Reply)
Discussion started by: heroine
1 Replies

8. HP-UX

Unix security

Is there anyway to trace where a user has logged in from. Someone this morning deleted some data but I only have the following info from the last command cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02) cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02) cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies

9. Solaris

Unix/Solaris security?

Hello Admins, I just have a curious question on unix passwords... As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system..... so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
secweb(1M)																secweb(1M)

NAME
secweb - invokes the HP-UX Auditing and Security Attributes Configuration tool SYNOPSIS
[ ] [ ] DESCRIPTION
The HP-UX Auditing and Security Attributes Configuration tool ( ) is used to configure suditing sub-system and, view and configure system- wide and per-user (Local users and NIS users) values of security attributes. It also gives information about account locks. The HP-UX Auditing and Security Attributes Configuration tool provides both Web-based and terminal user interface (for Security Attributes Configuration only). The Web-based interface is launched through the HP System Management Homepage. Superuser privileges are required to access the HP-UX Auditing and Security Attributes Configuration tool. A user who does not have supe- ruser privileges has read-only access to the System Defaults area in the HP-UX Auditing and Security Attributes Configuration tool and can- not modify or reset per-user values. The terminal user interface is invoked if any of the following conditions are true: o The command is invoked with option. o The environment variable is not set. The Web-based interface is launched if all the following conditions are true: o The command is invoked with option. o The environment variable is set. o The command is available on the system. If the Web-based interface cannot be launched, invokes the terminal user interface. Options recognizes the following options: Forces a client browser to be used in less secure ways. The option forces the client browser to be used or started, even when the X-traffic between the X-server and the Mozilla browser is not secure. Use this option only when you are sure the network traffic between the host where Mozilla is running and the host in the DISPLAY variable is secure. If cannot start the Web browser, the terminal interface is started. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. If a privileged user (root) executes the command with the option, a temporary login bypass key is generated. The bypass key enables the user to access the Web interface without having to provide login information again. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. Opens the terminal interface for setting system-wide and per-user values of security attributes regardless of the current setting of the environment variable. You can also start the HP-UX Auditing and Security Attributes Configuration tool using one of the following methods: o Invoke and select the Auditing and Security Attributes Configuration (character mode) functional area to launch the terminal user interface and the Auditing and Security Attributes Configuration (Web-based Interface) to launch the Web-based tool o Invoke the HP-UX Auditing and Security Attributes Configuration tool Web interface by typing the URL in the address bar of your browser, where hostname is the name of the server o Launch the HP-UX Systems Insight Manager on the server and select the Auditing and Security Attributes Configuration tool from Configure -> HP-UX Configuration menu Online Help After the HP-UX Auditing and Security Attributes Configuration tool is started, the online help provides details on how to use the tool. RETURN VALUES
Upon completion, secweb returns one of the following values: o 0 Successful o 1 An error occurred WARNINGS
o For increased security, paste the URL in your browser, click on the Tools menu in the menu bar, then the Auditing and Security Attributes Configuration functional area. o The default minimum values of the security attributes , , , and does not meet the requirements for passwd(1M) command. A password must contain at least two letters and at least one numeric or special character. It is recommended to change the default values in for the above mentioned security attributes as per passwd(1M) requirements. For more information on password construction requirements, refer passwd(1M). AUTHOR
was developed by Hewlett-Packard Company. SEE ALSO
sam(1M), security(4), userdb(4) secweb(1M)
All times are GMT -4. The time now is 09:55 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy