Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Enforcing a Two Man Rule Using Solaris 10 RBAC

Solaris

Enforcing a Two Man Rule Using Solaris 10 RBAC

Post date: April 28, 2005, 02:04 Category: Security Views: 4560 Comments
Tutorial quote: The "two man rule" (also sometimes called the "four eyes rule") has its origins in military protocol although for quite some time it has been welcomed into the stockpile of IT security controls used by organizations around the world. The "two man rule" specifies that there must be two individuals that must act in concert in order to perform some action.
Solaris

NSA Publically-Released Solaris 8 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 5984 Comments
Tutorial quote: Sun Solaris 8 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 8 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris

NSA Publically-Released Solaris 9 Security Guide

Post date: October 21, 2006, 04:10 Category: Security Views: 6503 Comments
Tutorial quote: Sun Solaris 9 Guides
NSA has developed and distributed configuration guidance for Sun Solaris 9 that is currently being used throughout the government and by numerous entities as a security baseline for their Sun Solaris systems.

Solaris

Diagnosing random crashes

Post date: April 13, 2005, 05:04 Category: Miscellaneous Views: 4114 Comments
Tutorial quote: Solaris will exercise everything on a PC. I have seen machines run just fine with Windows for months and crash during a Solaris x86 install. The reason was always marginal parts/specs/timings/temperatures that were never pushed to the failure limits until Solaris x86 was installed.
Solaris

Solaris 10 Service Management

Post date: March 16, 2010, 12:03 Category: System Views: 9522 Comments
Tutorial quote: Under the Solaris 10 system or the open Solaris as well, the service management have been upgraded, and there are great new tools to handle the sysadmin work on the services.
Solaris

AMPS (Apache MySQL PHP SSL) for Solaris 10

Post date: January 26, 2007, 06:01 Category: Software Views: 8862 Comments
Tutorial quote: The strategy is to utilize as much of the Open Source and other free software bundled with Solaris 10 as possible and integrate Apache2, MySQL, PHP and SSL in a environment that can take full advantage of Solaris 10 zones, resource management and highly scaleable, secure System Administration.
Solaris

Installing Solaris using JumpStart technology on an Intel laptop

Post date: April 13, 2005, 05:04 Category: Installing Views: 3823 Comments
Tutorial quote: An interesting use of Solaris 8 on a PC laptop is for use with the JumpStart technology. It has never been so easy to install, re-install, or restore a server before.

As I am as a contractor, I am more on the road than in my own office, so I need a laptop, and preferably with Solaris installed, as I am focusing on Sun's products and applications.

Through the years, I have discovered that one of the most common scenarios is that a client needs a server installed, either because they just bought it, or need it re-installed, or recovered.

This article covers how to save time when installing servers, using the JumpStart technology on a laptop with Solaris for Intel.
Linux

How To Secure An SSL VPN With One-Time Passcodes And Mutual Authentication

Post date: June 30, 2007, 23:06 Category: Security Views: 3484 Comments
Tutorial quote: SSL-based VPNs were designed to eliminate the need for complex configurations on the user's PC. Unfortunately, that was before the dangers of public WiFi networks and tougher regulatory requirements came into being. Thanks to WiFi, many attacks that were difficult are now quite simple. In particular, a man-in-the-middle attack can intercept SSL-encrypted traffic, rendering SSL-based VPNs useless - even if it is protected by a typical one-time password system. The man-in-the-middle can easily feed the one-time password into the SSL-based VPN within the alloted time.
Linux

Three tools to help you configure iptables

Post date: May 25, 2005, 14:05 Category: Network Views: 3140 Comments
Tutorial quote: Every user whose client connects to the Internet should configure his firewall immediately after installation. Some Linux distributions include firewall configuration as a part of installation, often offering a set of defaults configurations to choose from. However, to ensure that your machine presents the minimum "attack surface" (a measure of the number of vulnerable ports, user accounts, and sockets exposed to attack) to the predatory inhabitants of the Internet, you may need to do some manual configuration of your firewall. Here are three tools that can help.
The Linux kernel (version 2.4 onwards) contains a framework for packet filtering and firewalling using netfilter and iptables. Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. Iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target). Iptables has extensive documentation that can be accessed online or by typing man iptables at the command line. Yet despite the depth of the documentation available for iptables, its complexity can be baffling.
Unix+clones

Comparing MySQL performance

Post date: April 12, 2005, 07:04 Category: Benchmarks Views: 3454 Comments
Tutorial quote: With the introduction of the 2.6 Linux kernel, FreeBSD-5-STABLE, Solaris 10, and now NetBSD 2.0, you might be wondering which of them offers superior database performance. In my previous article, I discussed the tools I chose to test these venerable operating systems and the methodology by which they were tested. The result is this MySQL performance comparison between OpenBSD 3.6; NetBSD 2.0; FreeBSD 5.3 and 4.10; Solaris Express (build 69); and Linux 2.4 and 2.6 (Gentoo-based). Read on for the results.
Web-based applications and online marketing solutions - LumoLink