unix and linux commands - unix shell scripting

Newly Redesigned Cyber Security Central

 
Thread Tools Search this Thread
# 1  
Old 07-02-2010
Newly Redesigned Cyber Security Central

Welcome to the newly redesigned Cyber Security Central.

Cyber Security Central (www.cybersecuritycentral.com) is “Your Single Source for Everything Cyber Security” and is designed to deliver valuable information relating to the Cyber Security Community.

If you would like to contribute to the site, please email admin (at) cybersecuritycentral.com.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Red Hat

Central authentication server

Hi guys In the firm we are running Windows and Linux server. Currently all servers are using the same usernames and password and from my opinion is we are running bad and non secure practice. I was looking some documentation and I think best solution is to use SAMBA/LDAP/Kerberos to act as... (5 Replies)
Discussion started by: solaris_user
5 Replies

2. UNIX for Dummies Questions & Answers

Help with central syslog

Hi, I want to collect all syslog messages from thses servers to a central syslog server and store them in seperate files. I created new Redhat server to collect all the system logs, from Linux, Windows and Cisco to this new server. For example: syslog messages from server NY01 >... (4 Replies)
Discussion started by: samnyc
4 Replies

3. AIX

How to create - Central access printer..

Guys, Totally new to this... I have asked to create a Central access printer to an AIX Server.. Spoolserver : SapErpDev_DEV_00 Host : SapErpDev IP : 172.30.1.17 Device type : HPLJ4 Printer model - HPLJ 4 : HP laserjet 4 series PCL - 5 Question.. From my understanding, I... (3 Replies)
Discussion started by: mushr00m
3 Replies

4. Filesystems, Disks and Memory

Central Backup Server

Hi , I have several Linux Servers , and now i want to run a Central backup server. . I'm looking forward finding an enterprise solution for this affair . there are different types of data on this servers, like : Mysql databases , mail server, web server , Cacti and MRTG graphs , ... I find some... (1 Reply)
Discussion started by: nasser
1 Replies

5. Red Hat

Central Syslog

Hello, Does anyone have any suggestions for a central logging solution? We have several different environments. (dev, fit, prod) I think I've settled on using rsyslog but I'm not sure on best practice. Should I tier the logging? Is a database required? etc... Any suggestions? :confused: (1 Reply)
Discussion started by: dwells
1 Replies

6. UNIX and Linux Applications

Central Logging

Hello All, I need to implement central logging for our Linux/Solaris environment and was wondering if anyone had some suggestions on software/architecture. The ability to view live/search old logs via a gui and DB support is a must. Preferably an Oracle DB... Thanks. (3 Replies)
Discussion started by: dwells
3 Replies
Login or Register to Ask a Question
sec_intro(1m)															     sec_intro(1m)

NAME
sec_intro - Introduction to the DCE Security administrative commands DESCRIPTION
This section describes DCE Security commands for system administration. These commands are Manages Access Control Lists (ACLs) for DCE objects Starts the DCE Audit Daemon Changes user information, such as login name, password, home directory, password and account expiration dates, and login shell. The implementation of this utility is platform-specific. Use the chpass utility supplied by your platform vendor for changing user information. Validates a principal's identity and obtains a principal's network credentials. This command is used pri- marily during DCE configuration. Use the login utility supplied by your platform vendor for user login. Destroys your login context and credentials Obtains and caches a ticket granting ticket Lists cached tickets Updates local password and group files from DCE registry data Creates DCE registry entries based on password and group file entries Establishes DCE registry overrides for a principal on a local node Sample password management server Edits the registry database Administers the Security Server Creates registry databases The Security Server daemon Reconstructs or recovers a registry database Allows you to assume another user's identity. The implementation of this util- ity is platform-specific. Use the su utility supplied by your platform vendor. See the command's reference page for further information on each command. sec_intro(1m)