Sponsored Content
Full Discussion: Solaris vs Linux Security
Special Forums News, Links, Events and Announcements Solaris vs Linux Security Post 60796 by 98_1LE on Friday 21st of January 2005 08:51:07 PM
Old 01-21-2005
Uh, okay. Can someone explain why the same os on EMT64T hardware is more secure....

You do not have to spend $500 to get an UltraSparc box to compile code on. Ultra 5/10's can be had on eBay for 1/10 that.
 

4 More Discussions You Might Find Interesting

1. Cybersecurity

Linux Security help..! Thanks

I am newer to Linux/Unix/RedHat etc... I run a Linux root server with some 55 domain names, about 3 months ago the server was exploited. I need some good advice as far as Firewell's go and getting everything up and running. It was a pain in my *** and cost a lot of time and money.. Thanks! (0 Replies)
Discussion started by: denveraccess
0 Replies

2. UNIX for Dummies Questions & Answers

Unix/Linux security

Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually. Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies

3. Solaris

Solaris 9 security

Hi all, I have some questions for you about Solaris 9 security (if you also know the answers for Red Hat enterprise linux 3 et HP UX 11i, this would help too). I have already found many documents about general UNIX security, but some points are still obscure. Please take time to try to help... (3 Replies)
Discussion started by: Aaclof
3 Replies

4. Solaris

Unix/Solaris security?

Hello Admins, I just have a curious question on unix passwords... As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system..... so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
CMDIDE(4)						   BSD Kernel Interfaces Manual 						 CMDIDE(4)

NAME
cmdide -- CMD Technology and Silicon Image IDE disk controllers driver SYNOPSIS
cmdide* at pci? dev ? function ? flags 0x0000 options PCIIDE_CMD064x_DISABLE options PCIIDE_CMD0646U_ENABLEUDMA DESCRIPTION
The cmdide driver supports the CMD Technology PCI0640, PCI0643, PCI0646, PCI0648, PCI0649, and Silicon Image 0680 IDE controllers, and pro- vides the interface with the hardware for the ata(4) driver. The 0x0002 flag forces the cmdide driver to disable DMA on chipsets for which DMA would normally be enabled. This can be used as a debugging aid, or to work around problems where the IDE controller is wired up to the system incorrectly. SEE ALSO
ata(4), atapi(4), intro(4), pci(4), pciide(4), wd(4), wdc(4) BUGS
There's no way to reliably know if a PCI064x controller is enabled or not. If the driver finds a PCI064x, it will assume it is enabled unless the PCIIDE_CMD064x_DISABLE option is specified in the kernel config file. This will be a problem only if the controller has been dis- abled in the BIOS and another controller has been installed and uses the ISA legacy I/O ports and interrupts. The PCI0646U controller is known to be buggy with Ultra-DMA transfers, so Ultra-DMA is disabled by default for this controller. To enable Ultra-DMA, use the PCIIDE_CMD0646U_ENABLEUDMA option. Ultra-DMA can eventually be disabled on a per-drive basis with config flags, see wd(4). The timings used for the PIO and DMA modes for controllers listed above are for a PCI bus running at 30 or 33 MHz. This driver may not work properly on overclocked systems. BSD
December 13, 2003 BSD
All times are GMT -4. The time now is 04:08 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy