Sponsored Content
Full Discussion: Need Help
Special Forums Cybersecurity Need Help Post 51803 by woofie on Tuesday 1st of June 2004 07:47:26 PM
Old 06-01-2004
Just got a old system given to me on the weekend. It doesn't have working PS/2 ports (keyboard and mouse) So I'm going to use USB keybaord and mouse.

I'm looking at setting up a honeypot with this machine. Then with a Linux machine I was going to use that to hack into my Windows machine on my own network behind my firewall. Also just run basic scans and stuffn on my own network to see how the honey pot works and what information it gets etc.

I'm thinking then I might setup a IDS systems. Just to have a little play with that.

When all this is done and I got a betetr idea of how all this works and what can be done. I'm going to look at re-creating a distro of Linux for security. Not sure at teh features I'll do if I do this yet. This will mainly be for a learning thing, more then liekly wont go any further Smilie
 
dialups(4)						     Kernel Interfaces Manual							dialups(4)

NAME
dialups, d_passwd - dialup security control DESCRIPTION
and are used to control the dialup security feature of (see login(1)). If is present, the first word on each line is compared with the name of the line upon which the login is being performed (including the as returned by (see ttyname(3C)). If the login is occurring on a line found in dialup security is invoked. Anything after a space or tab is ignored. When dialup security is invoked, requests an additional password, and checks it against that found in The command name found in the ``pro- gram to use as shell'' field of is used to select the password to be used. Each entry in consists of three fields, separated by colons. The first is the command name, matching an entry in The second is the encrypted password to be used for dialup security for those users logging in to use that program. The third is commentary, but the second colon is required to delimit the end of the password. A null password is designated with two adjacent colons. The entry for is used if no other entry matches the command name taken from FILES
dial-in tty lines passwords SEE ALSO
login(1), passwd(4). dialups(4)
All times are GMT -4. The time now is 11:13 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy