ChinaUnix.net
相关文章推荐:

Loaded pluginsrhnplugin security

This article describes an easy process of implementing the observer pattern in the Spring framework (Spring Core). Also discussed in this article are a few of the Spring Core classes as well as an easy way to start the Spring Framework in any project. Finally, this article shows developers and designers that the Spring framework is a great reason to continue design pattern advocacy in your projec...

by xxcom - Java文档中心 - 2005-10-13 17:21:36 阅读(494) 回复(0)

相关讨论

安装一个ANDIrand-0.7-5.8-sparc-1.pkg ,安装最后如下。 /usr/kernel/drv/random.conf Modifying /etc/devlink.tab Driver (random) is already installed. Initializing random number generator... driver not loaded! 这个driver not loaded怎么解决那?谢谢。

by smallfish2186 - Solaris - 2006-08-17 11:03:11 阅读(724) 回复(3)

對於Port security, 一開始只是我們用來管制那些電腦可以連上公司網路的一種作法; 沒有申請的電腦, 無法連上內部網路; 自然我們就有了公司所有連網的電腦資料! 如果發生中毒或攻擊, 要找兇手就容易了! 也可以防止不相干人士, 任易地把電腦接上內部網路! SANS Institute - Intrusion Detection FAQ: Why your switched network isn't secure這篇文章有一段文字, 提到port security的妙用: "If your hub or switch has the ability ...

by 一路征程一路笑 - 网络技术文档中心 - 2009-03-16 14:54:07 阅读(836) 回复(0)

1.安全基础: a.建立安全政策 b.使安全作为系统设计的一个完整部分。 c.勾画物理和逻辑界限。『物理:恐怖主义,火灾,洪水,暴风雨等等。逻辑:病毒入侵,黑客,糟糕的系统配置,产品易损性』 d.开发安全码 2.基于风险的原理 a.降低风险到一个cost-effective点。 b.假定所有外部入口,eg用户,系统,网络,应用和数据,豆薯不可信任的。 c.识别贸易在减少风险和增加成本之间,和降低可操作的无效性。 d.实现量身定制安全控制。 e....

by solaris_IP - Solaris文档中心 - 2008-11-06 17:28:36 阅读(1094) 回复(0)

If you can't stop them getting in, catch them on the way out. Topics Password DB Link Password Cracking Track Objects Changed/Accessed SQL/Cursor Injection Startup Files Change Password with BBED Vulnerable Packages Network Note: All test cases are done on Oracle 92040 or 92080 or 10203 or 11106 under RHEL AS 4 without CPU applied.  Password The main password encryption principles are:...

by yaping - Oracle - 2008-09-01 08:53:26 阅读(2704) 回复(8)

This topic is incomplete. 11 August 1998 I decided it was time to improve the security on my system. I used http://www.freebsd.org/~jkb/howto.html as the starting point. Please read that resource in conjunction with what I have done below. in /etc/rc.conf, I set inetd_flags="-l -R 1024" Next, in /etc/inet.conf, I did: telnet stream tcp nowait root /usr/libexec/telnetd telnetd -h -U...

by 剑心通明 - BSD文档中心 - 2008-04-09 16:59:41 阅读(765) 回复(0)

Do I have to be root to save or recover files? No. These are not operator functions and can be performed by anyone on an authorized client machine. This is controlled by the NSR client list. However, users can only recover their own files. When do I need to be root? The nsradmin program must be run by root. The networker program can be run by any user, however, the windows under the Administra...

by hyperdoom - 存储备份 - 2007-07-03 15:52:30 阅读(1149) 回复(1)

BU Description IBM CDL IT team is responsible for CDL internal IT service, including Business Management, IT Applications & Tools, and System Support. Job Responsibilities Information technology security is a vital component of business success and it is especially important for IBM to demonstrate a leadership role in e-business security, including security for emerging on-demand IT services....

by csdltmp - IT职业生涯 - 2007-02-23 15:02:19 阅读(858) 回复(1)

security Administration Proper system administration is vital to maintaining the security of information resources on a computer system. AIX security is based on establishing and maintaining proper access control and accountability policies. It is an administrator's responsibility to configure the following aspects of security: Managing Protected Resources with Access Control ...

by netyu - AIX文档中心 - 2006-05-28 14:52:41 阅读(1284) 回复(0)

I have to secure a Solaris 8 environment by detecting and logging users accessing files/directories for which they have no access right.Is there any software to realize this.

by brric - Solaris - 2005-01-05 08:49:50 阅读(422) 回复(0)

Checking for uids of 0: root 0 toor 0 ============== whats toor ? a system account ?

by evice - BSD - 2004-04-25 20:54:14 阅读(833) 回复(1)