6 More Discussions You Might Find Interesting
1. Linux
Hi there,
I am trying to set a ulimit max in the /etc/security/limits.conf against a NIS netgroup (which contains a whole bunch of users) instead of a local user or group.
so I have a NIS netgroup called +@myusers , none of whose users are defined locally on the box. I want to ensure that... (2 Replies)
Discussion started by: rethink
2 Replies
2. Cybersecurity
Hi
I was wondering if someone could give some tips about network security postgraduate courses and/or certifications .
I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever.
My goal is to find a good course (or book) that... (0 Replies)
Discussion started by: Dedalus
0 Replies
3. UNIX for Advanced & Expert Users
I am going to take up a position in Data & Network Security.
I would need to write network shell scripts doing the following task:
Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access.
I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies
4. Cybersecurity
Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source.
1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies
5. Cybersecurity
Hello peoples, I could really use some expert advice.
Currently I am starting my curriculumn in CompSci. I am very interested in Unix, Shell Programming and Network Security. I would Like to work in Compusec/Infosec........fight system vulnerability for my future employer.
What Cert would you... (3 Replies)
Discussion started by: pacman-iac
3 Replies
6. Cybersecurity
hi there,
i'm wondering what are the good books out there on internet security, PREFERABELY all topics roll into 1 book
topics like firewall DES,3DES,SHA,SSL,CHAP,EAP SPAP,PAP,VPN,L2TP,PPTP,IAS,Kerboros,IPsec,PKI,digital signatures/certifcates,Denial of service,RADIUS,RAS,viruses,trojan... (2 Replies)
Discussion started by: happyfish
2 Replies