11-25-2003
try a search on freshmeat.net. i found this, though it may not be exaclty what you want, something you do want should be there.
http://freshmeat.net/projects/p-sync...50%2C253%2C861
damn a network security related post and its not in my forum i never get to moderate!
9 More Discussions You Might Find Interesting
1. Cybersecurity
I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
Discussion started by: GW01
3 Replies
2. UNIX Desktop Questions & Answers
Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level)
Thanks
Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies
3. UNIX Desktop Questions & Answers
Sorry, Unix file security
Thanks (1 Reply)
Discussion started by: DuttO
1 Replies
4. UNIX for Dummies Questions & Answers
Hello, I'm trying to find a Unix documentation about security! I mean I nead something very complex and complete, not just a document about kerberos, a document about securing against atack ... or others like those. I woulde like if exists, a documentation based on levels of security and expanding... (1 Reply)
Discussion started by: octav
1 Replies
5. UNIX for Dummies Questions & Answers
Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually.
Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies
6. UNIX for Dummies Questions & Answers
Hi to all,
Asking which of the Unix and Windows platform is better may sound stupid...!
But may I know what are the major differences between Unix and Windows in terms of security (authentication, access control, and complexity vs simplicit)?
In which ways Unix does better than windows and... (1 Reply)
Discussion started by: heroine
1 Replies
7. Cybersecurity
this is a pretty good article that is a little dated, but still very informative at freeos.com.
since this is Network Security for Dummies Q&A, maybe this should be the first step for unix.com users to check for general and more specific info on how to 'harden' their linux box.
some of this... (8 Replies)
Discussion started by: norsk hedensk
8 Replies
8. HP-UX
Is there anyway to trace where a user has logged in from.
Someone this morning deleted some data but I only have the following info from the last command
cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02)
cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02)
cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies
9. Solaris
Hello Admins,
I just have a curious question on unix passwords...
As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system.....
so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
LEARN ABOUT SUNOS
gshadow
GSHADOW(5) File Formats and Conversions GSHADOW(5)
NAME
gshadow - shadowed group file
DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts.
This file must not be readable by regular users if password security is to be maintained.
Each line of this file contains the following colon-separated fields:
group name
It must be a valid group name, which exist on the system.
encrypted password
Refer to crypt(3) for details on how this string is interpreted.
If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a
unix password to access the group (but group members do not need the password).
The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)).
This field may be empty, in which case only the group members can gain the group permissions.
A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line
represent the password field before the password was locked.
This password supersedes any password specified in /etc/group.
administrators
It must be a comma-separated list of user names.
Administrators can change the password or the members of the group.
Administrators also have the same permissions as the members (see below).
members
It must be a comma-separated list of user names.
Members can access the group without being prompted for a password.
You should use the same list of users as in /etc/group.
FILES
/etc/group
Group account information.
/etc/gshadow
Secure group account information.
SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1).
shadow-utils 4.5 01/25/2018 GSHADOW(5)