Sponsored Content
Full Discussion: unix security
Operating Systems HP-UX unix security Post 43961 by norsk hedensk on Tuesday 25th of November 2003 10:55:01 PM
Old 11-25-2003
try a search on freshmeat.net. i found this, though it may not be exaclty what you want, something you do want should be there.

http://freshmeat.net/projects/p-sync...50%2C253%2C861

damn a network security related post and its not in my forum i never get to moderate!Smilie
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Unix Security and auditing

I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
Discussion started by: GW01
3 Replies

2. UNIX Desktop Questions & Answers

Basic Unix Security

Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level) Thanks Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies

3. UNIX Desktop Questions & Answers

Unix Security

Sorry, Unix file security Thanks (1 Reply)
Discussion started by: DuttO
1 Replies

4. UNIX for Dummies Questions & Answers

Security in Unix - Documentation

Hello, I'm trying to find a Unix documentation about security! I mean I nead something very complex and complete, not just a document about kerberos, a document about securing against atack ... or others like those. I woulde like if exists, a documentation based on levels of security and expanding... (1 Reply)
Discussion started by: octav
1 Replies

5. UNIX for Dummies Questions & Answers

Unix/Linux security

Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually. Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies

6. UNIX for Dummies Questions & Answers

Unix vs Windows security

Hi to all, Asking which of the Unix and Windows platform is better may sound stupid...! But may I know what are the major differences between Unix and Windows in terms of security (authentication, access control, and complexity vs simplicit)? In which ways Unix does better than windows and... (1 Reply)
Discussion started by: heroine
1 Replies

7. Cybersecurity

Unix Security

this is a pretty good article that is a little dated, but still very informative at freeos.com. since this is Network Security for Dummies Q&A, maybe this should be the first step for unix.com users to check for general and more specific info on how to 'harden' their linux box. some of this... (8 Replies)
Discussion started by: norsk hedensk
8 Replies

8. HP-UX

Unix security

Is there anyway to trace where a user has logged in from. Someone this morning deleted some data but I only have the following info from the last command cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02) cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02) cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies

9. Solaris

Unix/Solaris security?

Hello Admins, I just have a curious question on unix passwords... As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system..... so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
GSHADOW(5)                                                 File Formats and Conversions                                                 GSHADOW(5)

NAME
gshadow - shadowed group file DESCRIPTION
/etc/gshadow contains the shadowed information for group accounts. This file must not be readable by regular users if password security is to be maintained. Each line of this file contains the following colon-separated fields: group name It must be a valid group name, which exist on the system. encrypted password Refer to crypt(3) for details on how this string is interpreted. If the password field contains some string that is not a valid result of crypt(3), for instance ! or *, users will not be able to use a unix password to access the group (but group members do not need the password). The password is used when a user who is not a member of the group wants to gain the permissions of this group (see newgrp(1)). This field may be empty, in which case only the group members can gain the group permissions. A password field which starts with an exclamation mark means that the password is locked. The remaining characters on the line represent the password field before the password was locked. This password supersedes any password specified in /etc/group. administrators It must be a comma-separated list of user names. Administrators can change the password or the members of the group. Administrators also have the same permissions as the members (see below). members It must be a comma-separated list of user names. Members can access the group without being prompted for a password. You should use the same list of users as in /etc/group. FILES
/etc/group Group account information. /etc/gshadow Secure group account information. SEE ALSO
gpasswd(5), group(5), grpck(8), grpconv(8), newgrp(1). shadow-utils 4.5 01/25/2018 GSHADOW(5)
All times are GMT -4. The time now is 12:39 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy