Sponsored Content
Full Discussion: Unix Security
Special Forums Cybersecurity Unix Security Post 51086 by pressy on Monday 10th of May 2004 06:12:56 PM
Old 05-10-2004
don'T forget solaris:

there is a nice toolbox for solaris:
http://wwws.sun.com/software/security/jass/index.html

greetings Preßy
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

Unix Security and auditing

I am starting an audit of unix security within our company and am looking for any information that may assist me with this. I am looking for any tips or pointers that I should be aware of when looking at unix. I am very new to unix so any help will do. Maybe there is someone out the that has had... (3 Replies)
Discussion started by: GW01
3 Replies

2. UNIX Desktop Questions & Answers

Basic Unix Security

Has anyone got any info on Unix security - I'm after the very basics as I'm a complete beginner (OS level) Thanks Dutt'O (2 Replies)
Discussion started by: DuttO
2 Replies

3. UNIX Desktop Questions & Answers

Unix Security

Sorry, Unix file security Thanks (1 Reply)
Discussion started by: DuttO
1 Replies

4. HP-UX

unix security

Was wondering if anyone could answer two quick questions... 1) What is the best way to impliment password triviality checking and also checking to make sure a user does not use the same password twice. 2) is there any nice software out there to manage users on multiple machine as far as security... (6 Replies)
Discussion started by: breigner
6 Replies

5. UNIX for Dummies Questions & Answers

Security in Unix - Documentation

Hello, I'm trying to find a Unix documentation about security! I mean I nead something very complex and complete, not just a document about kerberos, a document about securing against atack ... or others like those. I woulde like if exists, a documentation based on levels of security and expanding... (1 Reply)
Discussion started by: octav
1 Replies

6. UNIX for Dummies Questions & Answers

Unix/Linux security

Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually. Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies

7. UNIX for Dummies Questions & Answers

Unix vs Windows security

Hi to all, Asking which of the Unix and Windows platform is better may sound stupid...! But may I know what are the major differences between Unix and Windows in terms of security (authentication, access control, and complexity vs simplicit)? In which ways Unix does better than windows and... (1 Reply)
Discussion started by: heroine
1 Replies

8. HP-UX

Unix security

Is there anyway to trace where a user has logged in from. Someone this morning deleted some data but I only have the following info from the last command cromread pts/ta Wed Jul 22 06:55 - 06:57 (00:02) cromread pts/ta Wed Jul 22 06:43 - 06:46 (00:02) cromread pts/ta ... (3 Replies)
Discussion started by: spiers
3 Replies

9. Solaris

Unix/Solaris security?

Hello Admins, I just have a curious question on unix passwords... As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system..... so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
regcmp(1)                                                          User Commands                                                         regcmp(1)

NAME
regcmp - regular expression compile SYNOPSIS
regcmp [-] filename... DESCRIPTION
The regcmp command performs a function similar to regcmp and, in most cases, precludes the need for calling regcmp from C programs. Bypass- ing regcmp saves on both execution time and program size. The command regcmp compiles the regular expressions in filename and places the output in filename.i. OPTIONS
- If the - option is used, the output is placed in filename.c. The format of entries in filename is a name (C variable) followed by one or more blanks followed by one or more regular expressions enclosed in double quotes. The output of regcmp is C source code. Compiled regular expressions are represented as extern char vectors. filename.i files may thus be #included in C programs, or filename.c files may be compiled and later loaded. In the C program that uses the regcmp output, regex(abc,line) applies the regu- lar expression named abc to line. Diagnostics are self-explanatory. EXAMPLES
Example 1: Examples of the regcmp command. name "([A-Za-z][A-Za-z0-9_]*)$0" telno "({0,1}([2-9][01][1-9])$0){0,1} *" "([2-9][0-9]{2})$1[ -]{0,1}" "([0-9]{4})$2" The three arguments to telno shown above must all be entered on one line. In the C program that uses the regcmp output, regex(telno, line, area, exch, rest) applies the regular expression named telno to line. ENVIRONMENT VARIABLES
A general description of the usage of the LC_* environmental variables can be found in environ(5). LC_CTYPE Determines how regcmp handles characters. When LC_CTYPE is set to a valid value, regcmp can display and handle text and filenames containing valid characters for that locale. LC_MESSAGES Determines how diagnostic and informative messages are presented. This includes the language and style of the messages, and the correct form of affirmative and negative responses. In the "C" locale, the messages are presented in the default form found in the program itself (in most cases, U.S. English). ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWtoo | +-----------------------------+-----------------------------+ |CSI |Enabled | +-----------------------------+-----------------------------+ SEE ALSO
regcmp(3C), attributes(5), environ(5) SunOS 5.10 Dec 20 1996 regcmp(1)
All times are GMT -4. The time now is 03:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy