Sponsored Content
Full Discussion: Security for network
Special Forums Cybersecurity Security for network Post 9581 by PxT on Tuesday 30th of October 2001 11:15:09 AM
Old 10-30-2001
<A HREF="http://www1.fatbrain.com/asp/bookinfo/bookinfo.asp?theisbn=1565921488&vm=">Practical Unix & Internet Security<BR>
<IMG SRC="http://a1204.g.akamai.net/7/1204/1401/00082717011/images.barnesandnoble.com/images/1820000/1823113.gif"></A>
<BR>

is a good one, although it is now a little dated (2nd edition published 1995), the discussions are still relevant.


Anything by Bruce Schneier is also very good. His monthly <A HREF="http://www.counterpane.com/crypto-gram.html">Cryptogram</A> email newsletter is recommended reading for anyone interested in security.
 

6 More Discussions You Might Find Interesting

1. Cybersecurity

Unix Network Security Admin

Hello peoples, I could really use some expert advice. Currently I am starting my curriculumn in CompSci. I am very interested in Unix, Shell Programming and Network Security. I would Like to work in Compusec/Infosec........fight system vulnerability for my future employer. What Cert would you... (3 Replies)
Discussion started by: pacman-iac
3 Replies

2. Cybersecurity

Network Security

Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source. 1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies

3. Shell Programming and Scripting

NIS, Network security

Hi, I am about to take up task of shell scripting in Network Security. Just started on job. But everything looks new NIS etc.. I tried googling to find systematic explanation of network security terms and how to script for that. But was unable to find. Could anyone of you please direct me to... (1 Reply)
Discussion started by: tostay2003
1 Replies

4. UNIX for Advanced & Expert Users

Network Shell Script & Blade Logic & Network Security

I am going to take up a position in Data & Network Security. I would need to write network shell scripts doing the following task: Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access. I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies

5. What is on Your Mind?

Career in Networking & Network Security

Hii i want to make career in networking and i m new in this field could u plz help me what should i do (2 Replies)
Discussion started by: pawan_kumar
2 Replies

6. Cybersecurity

Network security course

Hi I was wondering if someone could give some tips about network security postgraduate courses and/or certifications . I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever. My goal is to find a good course (or book) that... (0 Replies)
Discussion started by: Dedalus
0 Replies
wanboot_keygen(1M)					  System Administration Commands					wanboot_keygen(1M)

NAME
wanboot_keygen - create and display client and server keys for WAN booting SYNOPSIS
/usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=3des /usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=aes /usr/lib/inet/wanboot/keygen -m /usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=sha1 /usr/lib/inet/wanboot/keygen -d -m /usr/lib/inet/wanboot/keygen -c -o net=a.b.c.d ,cid=client_ID,type=keytype DESCRIPTION
The keygen utility has three purposes: o Using the -c flag, to generate and store per-client 3DES/AES encryption keys, avoiding any DES weak keys. o Using the -m flag, to generate and store a "master" HMAC SHA-1 key for WAN install, and to derive from the master key per-client HMAC SHA-1 hashing keys, in a manner described in RFC 3118, Appendix A. o Using the -d flag along with either the -c or -m flag to indicate the key repository, to display a key of type specified by key- type, which must be one of 3des, aes, or sha1. The net and cid arguments are used to identify a specific client. Both arguments are optional. If the cid option is not provided, the key being created or displayed will have a per-network scope. If the net option is not provided, then the key will have a global scope. Default net and code values are used to derive an HMAC SHA-1 key if the values are not provided by the user. OPTIONS
The following options are supported: -c Generate and store per-client 3DES/AES encryption keys, avoiding any DES weak keys. Also generates and stores per-client HMAC SHA-1 keys. Used in conjunction with -o. -d Display a key of type specified by keytype, which must be one of 3des, aes, or sha1. Use -d with -m or with -c and -o. -m Generate and store a "master" HMAC SHA-1 key for WAN install. -o Specifies the WANboot client and/or keytype. EXAMPLES
Example 1 Generate a Master HMAC SHA-1 Key # keygen -m Example 2 Generate and Then Display a Client-Specific Master HMAC SHA-1 Key # keygen -c -o net=172.16.174.0,cid=010003BA0E6A36,type=sha1 # keygen -d -c -o net=172.16.174.0,cid=010003BA0E6A36,type=sha1 Example 3 Generate and Display a 3DES Key with a Per-Network Scope # keygen -c -o net=172.16.174.0,type=3des # keygen -d -o net=172.16.174.0,type=3des EXIT STATUS
0 Successful operation. >0 An error occurred. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWwbsup | +-----------------------------+-----------------------------+ |Interface Stability |Obsolete | +-----------------------------+-----------------------------+ SEE ALSO
attributes(5) SunOS 5.11 18 Apr 2003 wanboot_keygen(1M)
All times are GMT -4. The time now is 08:02 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy