Security Newsletter


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Newsletter
# 1  
Old 10-01-2001
Security Newsletter

Bruce Schneier has released a special edition of his monthly Crypto-Gram security newsletter. This issue discusses security & technology topics relating to the September 11th attack. It is not strictly Unix related, but I think it is well worth the read as it contains a lot of well-though out, interesting information.
Recommended reading for anyone interested in techology. (it is long: approx 18 pages)

http://www.counterpane.com/crypto-gram-0109a.html

Those of you in the US, if nothing else read the last section entitled "How to Help". A quote from the article:

"We have less than 100 hours before Congress acts on legislation that will (a) significantly expand the use of Carnivore, (b) make computer hacking a form of terrorism, (c) expand electronic surveillance in routine criminal investigations, and (d) reduce government accountability."

Check it out, and post your comments here.
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Newsletter email block.

I currently built a website and tested the newsletter with like 20 emails from the same provider (videotron.ca) since its the only provider i'm targeting with the newsletter. The automated message from the newsletter contains a link that videotron.ca usually blocks after a small period of time... (0 Replies)
Discussion started by: galford
0 Replies
Login or Register to Ask a Question
list_devices(1)                                                                                                                    list_devices(1)

NAME
list_devices - list allocatable devices SYNOPSIS
list_devices [-s] [ -U uid] -l [device] list_devices [-s] [ -U uid] -n [device] list_devices [-s] [ -U uid] -u [device] The list_devices utility lists the allocatable devices in the system according to specified qualifications. The device and all device special files associated with the device are listed. The device argument is optional and, if it is not present, all relevant devices are listed. The following options are supported: -l [device] Lists the pathname(s) of the device special files associated with the device that are allocatable to the current process. If device is given, lists only the files associated with the specified device. -n [device] Lists the pathname(s) of device special files associated with the device that are allocatable to the current process but are not currently allocated. If device is given, lists only the files associated with that device. -s Silent. Suppresses any diagnostic output. -u [device] Lists the pathname(s) of device special files, associated with the device that are allocated to the owner of the current process. If device is given, list only the files associated with that device. -U uid Uses the user ID uid instead of the real user ID of the current process when performing the list_devices operation. Only a user with the solaris.device.revoke authorization can use this option. The following exit values are returned: non--zero An error occurred. /etc/security/device_allocate /etc/security/device_maps /etc/security/dev/* /usr/security/lib/* See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ allocate(1), deallocate(1), bsmconv(1M), dminfo(1M), mkdevalloc(1M), mkdevmaps(1M), device_allocate(4), device_maps(4), attributes(5) The functionality described in this man page is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information. /etc/security/dev, mkdevalloc(1M), and mkdevmaps(1M) might not be supported in a future release of the Solaris Operating Environment. 28 Mar 2005 list_devices(1)