01-21-2005
Uh, okay. Can someone explain why the same os on EMT64T hardware is more secure....
You do not have to spend $500 to get an UltraSparc box to compile code on. Ultra 5/10's can be had on eBay for 1/10 that.
4 More Discussions You Might Find Interesting
1. Cybersecurity
I am newer to Linux/Unix/RedHat etc... I run a Linux root server with some 55 domain names, about 3 months ago the server was exploited. I need some good advice as far as Firewell's go and getting everything up and running. It was a pain in my *** and cost a lot of time and money.. Thanks! (0 Replies)
Discussion started by: denveraccess
0 Replies
2. UNIX for Dummies Questions & Answers
Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually.
Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies
3. Solaris
Hi all,
I have some questions for you about Solaris 9 security (if you also know the answers for Red Hat enterprise linux 3 et HP UX 11i, this would help too). I have already found many documents about general UNIX security, but some points are still obscure.
Please take time to try to help... (3 Replies)
Discussion started by: Aaclof
3 Replies
4. Solaris
Hello Admins,
I just have a curious question on unix passwords...
As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system.....
so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
LEARN ABOUT OPENSOLARIS
trusted_extensions
trusted_extensions(5) Standards, Environments, and Macros trusted_extensions(5)
NAME
trusted_extensions - Solaris Trusted Extensions
DESCRIPTION
SolarisTM Trusted Extensions software is a specific configuration of the Solaris Operating System (Solaris OS). Solaris Trusted Extensions
(Trusted Extensions) provides labels for local objects and processes, for the desktop and windowing system, for zones and file systems, and
for network communications. These labels are used to implement a Multilevel Security (MLS) policy that restricts the flow of information
based on label relationships. In contrast to Discretionary Access Control (DAC) based on ownership, the MLS policy enforced by Trusted
Extensions is an example of Mandatory Access Control (MAC).
By default, Trusted Extensions software is disabled. It is enabled and disabled (but not configured) by the labeld(1M) service, identified
by the FMRI:
svc:/system/labeld:default
Refer to the Administrator's Guide listed below for the required configuration of Trusted Extensions software necessary before use. The
system must be rebooted after enabling or disabling labeld to activate or deactivate Trusted Extensions software.
SEE ALSO
labeld(1M), label_encodings(4), labels(5)
Solaris Trusted Extensions Administrator's Procedures
Solaris Trusted Extensions User's Guide
SunOS 5.11 12 Nov 2007 trusted_extensions(5)