Sponsored Content
Full Discussion: Solaris vs Linux Security
Special Forums News, Links, Events and Announcements Solaris vs Linux Security Post 62486 by photon on Wednesday 16th of February 2005 12:57:19 PM
Old 02-16-2005
The author does have a point that the less well known an operating
system such as Solaris is, the less likely there is for they're to be a
virus or other maliciously coded plague to infect it. The writers of
these programs want to infect the most common operating systems
in use.

I like my old Red Hat 6.2 and Solaris 8 best and have never had a
problem and am reluctant to upgrade, because I think the less common operating systems will have less likely a chance of attack being unknown
to attackers.

Doesn't this line of reason make sense?
 

4 More Discussions You Might Find Interesting

1. Cybersecurity

Linux Security help..! Thanks

I am newer to Linux/Unix/RedHat etc... I run a Linux root server with some 55 domain names, about 3 months ago the server was exploited. I need some good advice as far as Firewell's go and getting everything up and running. It was a pain in my *** and cost a lot of time and money.. Thanks! (0 Replies)
Discussion started by: denveraccess
0 Replies

2. UNIX for Dummies Questions & Answers

Unix/Linux security

Hi all. I'm so new to Linux I don't even know where to start. I'm running sles 9 and I've had it up for 2 days now. I'd like to start with information on how to secure my server. I want to use it for hosting my personal web site and email eventually. Does anyone know of a good site that will... (2 Replies)
Discussion started by: jreid08
2 Replies

3. Solaris

Solaris 9 security

Hi all, I have some questions for you about Solaris 9 security (if you also know the answers for Red Hat enterprise linux 3 et HP UX 11i, this would help too). I have already found many documents about general UNIX security, but some points are still obscure. Please take time to try to help... (3 Replies)
Discussion started by: Aaclof
3 Replies

4. Solaris

Unix/Solaris security?

Hello Admins, I just have a curious question on unix passwords... As unix passwords are encrypted, so any hacker can took those passwds from etc/shadow and decrypt them using any algorithms....and using decryption, he can get the passwd and easily get into the system..... so how can... (4 Replies)
Discussion started by: snchaudhari2
4 Replies
trusted_extensions(5)					Standards, Environments, and Macros				     trusted_extensions(5)

NAME
trusted_extensions - Solaris Trusted Extensions DESCRIPTION
SolarisTM Trusted Extensions software is a specific configuration of the Solaris Operating System (Solaris OS). Solaris Trusted Extensions (Trusted Extensions) provides labels for local objects and processes, for the desktop and windowing system, for zones and file systems, and for network communications. These labels are used to implement a Multilevel Security (MLS) policy that restricts the flow of information based on label relationships. In contrast to Discretionary Access Control (DAC) based on ownership, the MLS policy enforced by Trusted Extensions is an example of Mandatory Access Control (MAC). By default, Trusted Extensions software is disabled. It is enabled and disabled (but not configured) by the labeld(1M) service, identified by the FMRI: svc:/system/labeld:default Refer to the Administrator's Guide listed below for the required configuration of Trusted Extensions software necessary before use. The system must be rebooted after enabling or disabling labeld to activate or deactivate Trusted Extensions software. SEE ALSO
labeld(1M), label_encodings(4), labels(5) Solaris Trusted Extensions Administrator's Procedures Solaris Trusted Extensions User's Guide SunOS 5.11 12 Nov 2007 trusted_extensions(5)
All times are GMT -4. The time now is 08:06 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy