linux operating commands and unix operating commands

Newly Redesigned Cyber Security Central

 
Thread Tools Search this Thread
# 1  
Old 07-02-2010
Newly Redesigned Cyber Security Central

Welcome to the newly redesigned Cyber Security Central.

Cyber Security Central (www.cybersecuritycentral.com) is “Your Single Source for Everything Cyber Security” and is designed to deliver valuable information relating to the Cyber Security Community.

If you would like to contribute to the site, please email admin (at) cybersecuritycentral.com.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Red Hat

Central authentication server

Hi guys In the firm we are running Windows and Linux server. Currently all servers are using the same usernames and password and from my opinion is we are running bad and non secure practice. I was looking some documentation and I think best solution is to use SAMBA/LDAP/Kerberos to act as... (5 Replies)
Discussion started by: solaris_user
5 Replies

2. UNIX for Dummies Questions & Answers

Help with central syslog

Hi, I want to collect all syslog messages from thses servers to a central syslog server and store them in seperate files. I created new Redhat server to collect all the system logs, from Linux, Windows and Cisco to this new server. For example: syslog messages from server NY01 >... (4 Replies)
Discussion started by: samnyc
4 Replies

3. AIX

How to create - Central access printer..

Guys, Totally new to this... I have asked to create a Central access printer to an AIX Server.. Spoolserver : SapErpDev_DEV_00 Host : SapErpDev IP : 172.30.1.17 Device type : HPLJ4 Printer model - HPLJ 4 : HP laserjet 4 series PCL - 5 Question.. From my understanding, I... (3 Replies)
Discussion started by: mushr00m
3 Replies

4. Filesystems, Disks and Memory

Central Backup Server

Hi , I have several Linux Servers , and now i want to run a Central backup server. . I'm looking forward finding an enterprise solution for this affair . there are different types of data on this servers, like : Mysql databases , mail server, web server , Cacti and MRTG graphs , ... I find some... (1 Reply)
Discussion started by: nasser
1 Replies

5. Red Hat

Central Syslog

Hello, Does anyone have any suggestions for a central logging solution? We have several different environments. (dev, fit, prod) I think I've settled on using rsyslog but I'm not sure on best practice. Should I tier the logging? Is a database required? etc... Any suggestions? :confused: (1 Reply)
Discussion started by: dwells
1 Replies

6. UNIX and Linux Applications

Central Logging

Hello All, I need to implement central logging for our Linux/Solaris environment and was wondering if anyone had some suggestions on software/architecture. The ability to view live/search old logs via a gui and DB support is a must. Preferably an Oracle DB... Thanks. (3 Replies)
Discussion started by: dwells
3 Replies
Login or Register to Ask a Question
secweb(1M)																secweb(1M)

NAME
secweb - invokes the HP-UX Auditing and Security Attributes Configuration tool SYNOPSIS
[ ] [ ] DESCRIPTION
The HP-UX Auditing and Security Attributes Configuration tool ( ) is used to configure suditing sub-system and, view and configure system- wide and per-user (Local users and NIS users) values of security attributes. It also gives information about account locks. The HP-UX Auditing and Security Attributes Configuration tool provides both Web-based and terminal user interface (for Security Attributes Configuration only). The Web-based interface is launched through the HP System Management Homepage. Superuser privileges are required to access the HP-UX Auditing and Security Attributes Configuration tool. A user who does not have supe- ruser privileges has read-only access to the System Defaults area in the HP-UX Auditing and Security Attributes Configuration tool and can- not modify or reset per-user values. The terminal user interface is invoked if any of the following conditions are true: o The command is invoked with option. o The environment variable is not set. The Web-based interface is launched if all the following conditions are true: o The command is invoked with option. o The environment variable is set. o The command is available on the system. If the Web-based interface cannot be launched, invokes the terminal user interface. Options recognizes the following options: Forces a client browser to be used in less secure ways. The option forces the client browser to be used or started, even when the X-traffic between the X-server and the Mozilla browser is not secure. Use this option only when you are sure the network traffic between the host where Mozilla is running and the host in the DISPLAY variable is secure. If cannot start the Web browser, the terminal interface is started. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. If a privileged user (root) executes the command with the option, a temporary login bypass key is generated. The bypass key enables the user to access the Web interface without having to provide login information again. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. Opens the terminal interface for setting system-wide and per-user values of security attributes regardless of the current setting of the environment variable. You can also start the HP-UX Auditing and Security Attributes Configuration tool using one of the following methods: o Invoke and select the Auditing and Security Attributes Configuration (character mode) functional area to launch the terminal user interface and the Auditing and Security Attributes Configuration (Web-based Interface) to launch the Web-based tool o Invoke the HP-UX Auditing and Security Attributes Configuration tool Web interface by typing the URL in the address bar of your browser, where hostname is the name of the server o Launch the HP-UX Systems Insight Manager on the server and select the Auditing and Security Attributes Configuration tool from Configure -> HP-UX Configuration menu Online Help After the HP-UX Auditing and Security Attributes Configuration tool is started, the online help provides details on how to use the tool. RETURN VALUES
Upon completion, secweb returns one of the following values: o 0 Successful o 1 An error occurred WARNINGS
o For increased security, paste the URL in your browser, click on the Tools menu in the menu bar, then the Auditing and Security Attributes Configuration functional area. o The default minimum values of the security attributes , , , and does not meet the requirements for passwd(1M) command. A password must contain at least two letters and at least one numeric or special character. It is recommended to change the default values in for the above mentioned security attributes as per passwd(1M) requirements. For more information on password construction requirements, refer passwd(1M). AUTHOR
was developed by Hewlett-Packard Company. SEE ALSO
sam(1M), security(4), userdb(4) secweb(1M)