Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

close_secdef(3) [hpux man page]

secdef(3)						     Library Functions Manual							 secdef(3)

NAME
secdef: open_secdef(), close_secdef(), get_secdef_str(), get_secdef_int() - security defaults configuration file routines SYNOPSIS
DESCRIPTION
opens the security configuration file This function must be called prior to calling or closes the security configuration file. and return the value of the specified parameter defined in the security configuration file. See the security(4) manpage. Programs using these routines must be compiled with APPLICATION USAGE
In a multithreaded application, these interfaces are thread-safe, but not async-cancel-safe. A cancellation point may occur when a thread is executing any of these interfaces. RETURN VALUE
returns a value of if the open completed successfully. Otherwise, it returns and leaves unchanged from the call. and return the follow- ing: The value of the specified parameter was successfully returned. The entry was not found, or the security configuration file was not opened. The format of the entry was incorrect. EXAMPLES
This example obtains the "path" from the parameter. FILES
Security defaults configuration file. SEE ALSO
security(4). secdef(3)

Check Out this Related Man Page

secdef(3)						     Library Functions Manual							 secdef(3)

NAME
secdef: open_secdef(), close_secdef(), get_secdef_str(), get_secdef_int() - security defaults configuration file routines SYNOPSIS
DESCRIPTION
opens the security configuration file This function must be called prior to calling or closes the security configuration file. and return the value of the specified parameter defined in the security configuration file. See the security(4) manpage. Programs using these routines must be compiled with APPLICATION USAGE
In a multithreaded application, these interfaces are thread-safe, but not async-cancel-safe. A cancellation point may occur when a thread is executing any of these interfaces. RETURN VALUE
returns a value of if the open completed successfully. Otherwise, it returns and leaves unchanged from the call. and return the follow- ing: The value of the specified parameter was successfully returned. The entry was not found, or the security configuration file was not opened. The format of the entry was incorrect. EXAMPLES
This example obtains the "path" from the parameter. FILES
Security defaults configuration file. SEE ALSO
security(4). secdef(3)
Man Page

12 More Discussions You Might Find Interesting

1. Cybersecurity

Certification

are there any unix certification's on security, and which is the most best one to take? (2 Replies)
Discussion started by: lealyz
2 Replies

2. Cybersecurity

ISS screws up.

Seems that security company ISS who brought us products such as BlackICE defender, released to the public, information concerning a vulnerability in apache that effects all versions on all platforms before telling the developers at Apache about it. This forced the people at Apache to work quickly... (1 Reply)
Discussion started by: ThePreacher
1 Replies

3. Cybersecurity

Need Help

I would really like to work within security in the I.T industry, though I am not sure what my next step should be. I can not afford a security course at this point in time. I have been reading books and catching up with security tips as much as I can from the Internet. Though I feel I can... (6 Replies)
Discussion started by: woofie
6 Replies

4. Cybersecurity

Network Security

Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source. 1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies

5. Cybersecurity

One Question about security

Hi there, Due to limited resource available in my network, I had to allow users comming from internet to telnet my SCO UNIXWARE box directly, like: telnet 23.1.1.2, anyone can access. I can't make it secure based on IP addresses or hostnames since IP address is dynamic. I have made all the... (9 Replies)
Discussion started by: tayyabq8
9 Replies

6. Cybersecurity

Does anyone know any ways to protect social security number?

Hello everybody, I have been using my social security number for my taxation purposes. But, I have been recently intimidated by my lawyer that since the crime of identity theft has been on the high I should be careful in using it. I am really concerned about this and need to know whether there are... (1 Reply)
Discussion started by: shanekol
1 Replies

7. AIX

security wrappers

Hi All, Any idea what is the security wrappers on AIX 5.3? Any idea will be highly appreciated, thanks. (1 Reply)
Discussion started by: itik
1 Replies

8. Cybersecurity

Hey guys

Hey guys, new geek here, sorry I didnt see a intro section. But I do have a question and hope to make my stay here perma. I am interested in IT security, ands I really want to learn, I was hoping for whatever questions I had you guys could lead me through the narrowest path with a broad selection... (1 Reply)
Discussion started by: abeja
1 Replies

9. Shell Programming and Scripting

Security

How to put security at the port???? (1 Reply)
Discussion started by: Mac91
1 Replies

10. Cybersecurity

hacking

I want to start with hacking and learning it from the scratch! I have googled and found thousands of pages but I would like to know how to start really! It's always good to hear from security experts. please give me some links. the ones which are related to unix hacking. (1 Reply)
Discussion started by: messi777
1 Replies

11. Shell Programming and Scripting

Need help

Hi, for security reason,deleting this thread. thx for cooperation and help Thx (4 Replies)
Discussion started by: kirankumar
4 Replies

12. UNIX for Beginners Questions & Answers

Beginning my programming/scripting path

Hey all, I am senior network security admin and started my cyber security master study 2 month ago. I definitely believe in my network and network security skills therefore want to mostly hardening cyber qualities. Along with cyber security I am really interested in programming which I believe... (6 Replies)
Discussion started by: orkhan
6 Replies