learn unix and linux commands

Videos from Team Cymru

 
Thread Tools Search this Thread
# 1  
Old 07-26-2009
Videos from Team Cymru

Short videos (slide desks and voiceover) on various security topics, mostly relating to malware in some way.  Basic information, but quite suitable for security awareness presentations.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. What is on Your Mind?

Need the Linux Kongress Videos

Is there any way to view the Linux Kongress videos ? Are there any recordings of it or any blog posts of what is described ? (0 Replies)
Discussion started by: sreyan32
0 Replies

2. What is on Your Mind?

videos

hiya guys :p RUmdWdEgHgk Zz-DJr1Qs54 6Ejga4kJUts (1 Reply)
Discussion started by: sparcguy
1 Replies

3. What is on Your Mind?

Nice YouTube Videos

What are they doing? :D kyJHeIqYoLQ ---------- Post updated 11-14-09 at 10:24 AM ---------- Previous update was 11-13-09 at 04:53 PM ---------- Heard of them? Who's them? :b: Totally Hidden Extreme Magic (1/6) mSLMOUOtaQQ Totally Hidden Extreme Magic (2/6) 2bwp2GUrNNc Totally... (3 Replies)
Discussion started by: sparcguy
3 Replies

4. Shell Programming and Scripting

training videos

Dear Experts, I just want any web site from where i can download free or i can buy a full trainning video of unix shell programming. Can any body tell me the good video CBT for unic shell scripting. Regards, SHARY (1 Reply)
Discussion started by: shary
1 Replies
Login or Register to Ask a Question
deallocate(1)															     deallocate(1)

NAME
deallocate - device deallocation SYNOPSIS
deallocate [-s] device deallocate [-s] [-F] device deallocate [-s] -I The deallocate utility deallocates a device allocated to the evoking user. device can be a device defined in device_allocate(4) or one of the device special files associated with the device. It resets the ownership and the permission on all device special files associated with device, disabling the user's access to that device. This option can be used by an authorized user to remove access to the device by another user. The required authorization is solaris.device.allocate. When deallocation or forced deallocation is performed, the appropriate device cleaning program is executed, based on the contents of device_allocate(4). These cleaning programs are normally stored in /etc/security/lib. The following options are supported: device Deallocate the device associated with the device special file specified by device. -s Silent. Suppresses any diagnostic output. -F device Forces deallocation of the device associated with the file specified by device. Only a user with the solaris.device.revoke authorization is permitted to use this option. -I Forces deallocation of all allocatable devices. Only a user with the solaris.device.revoke authorization is permitted to use this option. This option should only be used at system initialization. The following exit values are returned: non--zero An error occurred. /etc/security/device_allocate /etc/security/device_maps /etc/security/dev/* /etc/security/lib/* See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ allocate(1), list_devices(1), bsmconv(1M), dminfo(1M), mkdevalloc(1M), mkdevmaps(1M), device_allocate(4), device_maps(4), attributes(5) The functionality described in this man page is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information. /etc/security/dev, mkdevalloc(1M), and mkdevmaps(1M) might not be supported in a future release of the Solaris Operating Environment. 28 Mar 2005 deallocate(1)