Whitelist, goodware, database of hashes


 
Thread Tools Search this Thread
Special Forums Cybersecurity Whitelist, goodware, database of hashes
# 1  
Old 03-14-2013
Whitelist, goodware, database of hashes

I have found this excellent site: NSRL Downloads
(sorry if it was already mentioned)

there are Solaris and Linux files there too.
its all in a text file, over 11Gb large.
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Hardware

HP notebook PC wifi card whitelist problem

I have hp dv6 and dv7 notebook pcs on which I want to upgrade the wifi cards but when I install the new cards and boot them, the they won't even boot to the bios and they both give me the same error: "104-Unsupported wireless network device detected. System Halted. Remove device and restart." When... (1 Reply)
Discussion started by: milhan
1 Replies

2. Shell Programming and Scripting

Using "whitelist" from a file to remove entries

Dear all, what I need to do is extract an entries list from a file and remove some entries based on a white list present on other file, then output into result.txt file. Example: source.txt: 12345 text1 text2 text3 text4 123 text1 text2 text3 text4 678 text1 text2 text3 text4 987 text1... (8 Replies)
Discussion started by: Lord Spectre
8 Replies

3. Shell Programming and Scripting

Perl : array of hashes help

Hi, I have array of hashes and each key has array like below. @array1 = ( { 'url' => , 'bill' => }, { 'url' => , 'bill' => }, { 'url' => , ... (0 Replies)
Discussion started by: ragilla
0 Replies

4. Shell Programming and Scripting

Creating Hashes of Hashes of Array

Hi folks, I have a structure as mentioned below in a configuration file. <Component> Comp1: { item1:data,someUniqueAttribute; item2:data,someUniqueAttribute, } Comp2: { item3:data,someUniqueAttribute; ... (1 Reply)
Discussion started by: ckv84
1 Replies

5. Shell Programming and Scripting

list of hashes

Hello everyone, I was wondering if someone can help me with this problem: @LoHashes = ({"a"=>1,"b"=>2,"c"=>3,"d"=>4}, {"a"=>5,"b"=>6,"c"=>7}); @LoHashes = create_list(\&LoHashes); sub create_list { foreach $hash(@LoHashes) { foreach (sort keys... (2 Replies)
Discussion started by: new bie
2 Replies

6. Shell Programming and Scripting

perl hash of hashes from database

hi there, I have some database output that looks like this SELECT nic_name,nic_duplex,nic_speed,nic_ip FROM network_table WHERE hostname = "server1" result is this (ive delimited with a pipe for ease of reading) bge0|full|1000|10.32.100.1 bge1|full|1000|11.12.101.7 ... (1 Reply)
Discussion started by: hcclnoodles
1 Replies

7. Shell Programming and Scripting

Hashes help in Perl

Hi, I am stuck at this problem where part of my code would store all the websites that has been accessed by a user. I pull these values from a log file. I want to create a HASH of HASHES ? (Please correct me if this is not the right approach) where I would store all the hits to website with... (4 Replies)
Discussion started by: Dabheeruz
4 Replies

8. UNIX for Dummies Questions & Answers

Name in hashes(####)???

Hey frens someone pls temme what i need to do so that after I logged into my unix terminal i should get my name written in hashes(i.e ###) Hope someone ll help me out.... (2 Replies)
Discussion started by: smarty86
2 Replies

9. Shell Programming and Scripting

Perl Regular Expression - Whitelist

I am creating a whitelist for User Input Validation. Here is a code snippet that allows alphanumeric and forward slash (/). if ( $variable =~ /^*$/ ) #allow alphanumeric and fwd slash { $returnValue = 'good data'; } ... (3 Replies)
Discussion started by: mh53j_fe
3 Replies

10. Shell Programming and Scripting

How To Sort Array of Hashes ??

Some one plz help me how to sort an array of hashes ..... for e.g i have an array as @AoH = ( { ques => 10, marks => 32, }, { ques => 32, marks => 22, }, { ques => 2, marks => 41, }, ); now i want to sort this array with increasing value of "ques" ..... plz... (3 Replies)
Discussion started by: coolguyshail
3 Replies
Login or Register to Ask a Question
db_recover(8)						      System Manager's Manual						     db_recover(8)

NAME
db_recover - Restores the database to a consistent state (Enhanced Security) SYNOPSIS
/usr/tcb/bin/db_recover [-cv] [-h home] FLAGS
Failure was catastrophic. Specify a home directory for the database. The correct directory for enhanced security is /var/tcb/files. Write out the pathnames of all of the database log files, whether or not they are involved in active transactions. Run in verbose mode. DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup- port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check- pointing to record changes. The db_recover utility runs after an unexpected system failure to restore the security database to a consistent state. All committed transactions are guaranteed to appear after db_recover has run, and all uncommitted transactions are completely undone. DB recovery is normally performed automatically for the security files as part of system startup. In the case of catastrophic failure, an archival copy, or snapshot of all database files must be restored along with all of the log files written since the database file snapshot was made. (If disk space is a problem, log files may be referenced by symbolic links). If the failure was not catastrophic, the files present on the system at the time of failure are sufficient to perform recovery. If log files are missing, db_recover identifies the missing log files and fails, in which case the missing log files need to be restored and recovery performed again. The db_recover utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption, it should always be given the chance to detach and exit gracefully. To cause db_recover to clean up after itself and exit, send it an interrupt sig- nal (SIGINT). RETURN VALUES
The db_recover utility exits 0 on success, and >0 if an error occurs. ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home directory for security is /var/tcb/files. FILES
/var/tcb/files/auth.db /var/tcb/files/dblogs/* RELATED INFORMATION
Commands: db_archive(8), db_checkpoint(8), db_printlog(8), db_dump(8), db_load(8), db_stat(8), secconfig(8) delim off db_recover(8)