9 More Discussions You Might Find Interesting
1. Red Hat
Hi guys, new user here, so please be gentle.
I need to build a lot of servers at work on a weekly basis with various versions of RH and additional applications.
We use PXE/Kickstart to do this with selections made from a simple menu structure.
However, I keep hearing about Cobbler and... (0 Replies)
Discussion started by: hankpym
0 Replies
2. Homework & Coursework Questions
The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography.
4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering
I don't think there is any coding since it is just configuring... (3 Replies)
Discussion started by: wilsonljx
3 Replies
3. Red Hat
I have encountered some problems in my school work.
Here is the question:
The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography.
Much Appreciated!:) (1 Reply)
Discussion started by: wilsonljx
1 Replies
4. Filesystems, Disks and Memory
I analysed disk performance with blktrace and get some data:
read:
8,3 4 2141 2.882115217 3342 Q R 195732187 + 32
8,3 4 2142 2.882116411 3342 G R 195732187 + 32
8,3 4 2144 2.882117647 3342 I R 195732187 + 32
8,3 4 2145 ... (1 Reply)
Discussion started by: W.C.C
1 Replies
5. What is on Your Mind?
Hi to all of you guys, I'm new here...
May this thread fits on this section. A friend of mine gave me this enigma to do, written in excel. I attach the file below, name New.xls.
Enigma:
There are 10^20 possibilities of tables (Table1, Table 2, Table 3, Table 4, Table 5,...), with ten rows (row... (3 Replies)
Discussion started by: lucky7
3 Replies
6. UNIX for Advanced & Expert Users
Dear Folks,
I have to backup pgsql database dump everynight on a routine. The database dump actually contains sql(text) statements. The actual size of the database dump is aroung 800 MB. Between two days backup, only few lines of statements are modified/added/deleted.
I dont want to do... (1 Reply)
Discussion started by: rssrik
1 Replies
7. Shell Programming and Scripting
Hi,
I have a file which contains 4 columns. I want to encrypt only the first column. The rest of data must be as it is.
flat file:
12234333 jakdjf 394839 343874
73746373 5jdkfdj 383993 958939
83473843 lksdjfj 388383 349399
so, 1 should be replace by 4, 2 with 8, 3 with 7.....
the... (4 Replies)
Discussion started by: javeed7
4 Replies
8. Cybersecurity
As we know, firewall is designed to keep unauthorized outsiders from tampering with a computer system or network. We don't talk about computer security without cryptography.
In this case, may I know,How does cryptographic protection (at the TCP/IP layers or at the application layer) affect a... (1 Reply)
Discussion started by: heroine
1 Replies
9. Filesystems, Disks and Memory
Hello,
I have a Supermicro server with a P4SCI mother board running Debian Sarge 3.1. This is the "dmidecode" output related to RAM info:
RAM speed information is incomplete.. "Current Speed: Unknown", is there anyway/soft to get the speed of installed RAM modules? thanks!!
Regards :)... (0 Replies)
Discussion started by: Santi
0 Replies
auths(1) User Commands auths(1)
NAME
auths - print authorizations granted to a user
SYNOPSIS
auths [ user ...]
DESCRIPTION
The auths command prints on standard output the authorizations that you or the optionally-specified user or role have been granted. Autho-
rizations are rights that are checked by certain privileged programs to determine whether a user may execute restricted functionality.
Each user may have zero or more authorizations. Authorizations are represented by fully-qualified names, which identify the organization
that created the authorization and the functionality that it controls. Following the Java convention, the hierarchical components of an
authorization are separated by dots (.), starting with the reverse order Internet domain name of the creating organization, and ending with
the specific function within a class of authorizations.
An asterisk (*) indicates all authorizations in a class.
A user's authorizations are looked up in user_attr(4) and in the /etc/security/policy.conf file (see policy.conf(4)). Authorizations may be
specified directly in user_attr(4) or indirectly through prof_attr(4). Authorizations may also be assigned to every user in the system
directly as default authorizations or indirectly as default profiles in the /etc/security/policy.conf file.
EXAMPLES
Example 1: Sample output
The auths output has the following form:
example% auths tester01 tester02
tester01 : solaris.system.date,solaris.jobs.admin
tester02 : solaris.system.*
example%
Notice that there is no space after the comma separating the authorization names in tester01.
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
FILES
/etc/user_attr
/etc/security/auth_attr
/etc/security/policy.conf
/etc/security/prof_attr
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
profiles(1), roles(1), getauthattr(3SECDB), auth_attr(4), policy.conf(4), prof_attr(4), user_attr(4), attributes(5)
SunOS 5.10 25 Mar 2004 auths(1)