Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

secmod.db(5) [centos man page]

SECMOD.DB(5)						     Network Security Services						      SECMOD.DB(5)

NAME
secmod.db - Legacy NSS security modules database DESCRIPTION
secmod.db is an NSS security modules database. The security modules database is used to keep track of the NSS security modules. The NSS security modules export their services via the PKCS #11 API which NSS uses as its Services Provider Interface. The command line utility modutil is used for managing PKCS #11 module information both within secmod.db files and within hardware tokens. For new applications the recommended way of tracking security modules is via the pkcs11.txt configuration file used in conjunction the new sqlite-based shared database format for certificate and key databases. FILES
/etc/pki/nssdb/secmod.db SEE ALSO
modutil(1), cert8.db(5), cert9.db(5), key3.db(5), key4.db(5), pkcs11.txt(5) AUTHORS
The nss libraries were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google. Authors: Elio Maldonado <emaldona@redhat.com>. LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. nss 3.15.4 17 June 2014 SECMOD.DB(5)

Check Out this Related Man Page

PP(1)								NSS Security Tools							     PP(1)

NAME
pp - Prints certificates, keys, crls, and pkcs7 files SYNOPSIS
pp -t type [-a] [-i input] [-o output] STATUS
This documentation is still work in progress. Please contribute to the initial review in Mozilla NSS bug 836477[1] DESCRIPTION
pp pretty-prints private and public key, certificate, certificate-request, pkcs7 or crl files OPTIONS
-t type specify the input, one of {private-key | public-key | certificate | certificate-request | pkcs7 | crl} -a Input is in ascii encoded form (RFC1113) -i inputfile Define an input file to use (default is stdin) -u outputfile Define an output file to use (default is stdout) ADDITIONAL RESOURCES
NSS is maintained in conjunction with PKI and security-related projects through Mozilla and Fedora. The most closely-related project is Dogtag PKI, with a project wiki at PKI Wiki[2]. For information specifically about NSS, the NSS project wiki is located at Mozilla NSS site[3]. The NSS site relates directly to NSS code changes and releases. Mailing lists: pki-devel@redhat.com and pki-users@redhat.com IRC: Freenode at #dogtag-pki AUTHORS
The NSS tools were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google. Authors: Elio Maldonado <emaldona@redhat.com>, Deon Lackey <dlackey@redhat.com>. LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. NOTES
1. Mozilla NSS bug 836477 https://bugzilla.mozilla.org/show_bug.cgi?id=836477 2. PKI Wiki http://pki.fedoraproject.org/wiki/ 3. Mozilla NSS site http://www.mozilla.org/projects/security/pki/nss/ nss-tools 12 November 2013 PP(1)
Man Page

8 More Discussions You Might Find Interesting

1. Cybersecurity

Denial of Services Attacks and Vulnerabilities

I've recently registered for the site and have found it very useful thus far. However, I am a student currently researching network attacks, specifically, denial of services and the damage posed to operating systems. If you have any information about this topic, please send to me. Thanks,... (1 Reply)
Discussion started by: darandkat
1 Replies

2. Cybersecurity

SCO Support Services: Security Advisories

Link to SCO security bulletins: http://www.caldera.com/support/security/ (0 Replies)
Discussion started by: Neo
0 Replies

3. Cybersecurity

Network Security

Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source. 1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies

4. Cybersecurity

Unix Services (Solaris 9)

Our systems group is asking if it would be Ok to turn off certain services due to potention security risks. The following are being contemplated. Service chargen daytime discard dtspcd echo exec finger fs gssd in.comsat kcms_server ktkt_warnd login name rpc.cmsd rpc.metad... (4 Replies)
Discussion started by: BCarlson
4 Replies

5. Shell Programming and Scripting

Record Length too long -- AWK Problem

Hi All, I have a txt file which is an export of a query result from the database. The txt file contains 'Processid#sqlquery' from the database table.As the sqlquery is too long.... i am unable to get the fields seperated using the awk script as below:- cat sql.txt | awk -F'#' '{printf $2}'... (2 Replies)
Discussion started by: venkatajay_18
2 Replies

6. AIX

security wrappers

Hi All, Any idea what is the security wrappers on AIX 5.3? Any idea will be highly appreciated, thanks. (1 Reply)
Discussion started by: itik
1 Replies

7. UNIX for Dummies Questions & Answers

Security Question

In an effort to adapt to best security practices, it has been suggested that a number of scripts that are going to be distributed to multiple machines across an internal network use be modified to replace instances of rsh and rcp with openSSH ssh and scp. Since there are so many references to rsh... (1 Reply)
Discussion started by: jasondj
1 Replies

8. Shell Programming and Scripting

Combine 3 files based on a pattern

HI, I have 3 files that contain the following information (sql output from Oracle database stored in a txt file): File1.txt : alter table "SYS"."INT_COST_PRICE" enable row movement; alter table "SYS"."INT_SOH" enable row movement; alter table "SYSMAN"."XX_ACI_SKURTP" enable row movement;... (6 Replies)
Discussion started by: rparavastu
6 Replies