By IBM Redbooks
This record discusses some of the security-related parts of AIX 4.1. it truly is directed towards a reader who's a method administrator for a number of AIX platforms, even supposing a lot of the cloth will be priceless to AIX clients. suggestions and recommendations for set up and day by day management are integrated. really good issues, together with DCE and NIS, aren't mentioned. simple UNIX wisdom is believed.
Read Online or Download Elements of Security: AIX 4.1 PDF
Best unix books
Get step by step directions for making Linux deploy easy and painless; get yourself up to speed with the Linux shell, dossier method, and textual content editor; Use the XWindow method to customise your computer menus, icons, window supervisor, and xterm; Create and put up formatted records with Linux functions; Get step -by-step directions for making Linux install basic and painless; achieve key approach management abilities together with developing clients, automating process projects, backing up and restoring records, and knowing the most recent safeguard matters and threats.
Utilize your SAS output! the right way to generate technique output for you to view with an online browser or that takes benefit of a excessive solution PostScript printer; flip the output of a strategy right into a SAS information set; switch the presentation of a procedure's effects to fit your personal wishes; and alter the colours and fonts that SAS makes use of in HTML and printer output.
Equipped round the examination goals for simple reference in the course of particular aim concentration, A+ Certification Bible comprises vast self-evaluation possibilities that will help you ascertain what components want extra examine. finished insurance helps you to maximize the knowledge, and tailor your learn on your personal wishes at any point of expertise.
UNIX / Linux spielt heute in der Praxis eingesetzter Systemplattformen eine entscheidende Rolle. In diesem Buch finden Sie einen schnellen Einstieg in die Systemprogrammierung. Neben Grundlagen und Konzepten lernen Sie die wesentlichen Systemaufrufe kennen. Sie erfahren, wie UNIX / Linux aufgebaut ist und wie guy die Standardbausteine verwendet, um eigene Systemprogramme zu erstellen.
- Essential System Administration: Commands and File Formats (Pocket Reference)
- Sams Teach Yourself Red Hat Linux 8 in 24 Hours
- Keine Angst vor UNIX/Linux: Ein Lehrbuch für Ein und Umsteiger in UNIX (Solaris, HP-UX, AIX, ...) und Linux
- Linux Server Hacks (Vol. 2)
- Bash Cookbook [unix shell programming]
- Grundkurs UNIX/Linux: Das neuartige Medienbuch: Lehrbuch und interaktive Software in Einem
Extra info for Elements of Security: AIX 4.1
The AUTHENTICATION GRAMMAR (line 18) should be left with the default “compat” value. This will be used with future enhancements for distributed systems. 4, “Passwords” on page 21. We suggest you leave these lines unchanged. Do not enter anything in the REGISTRY (line 32). This is for future use with DCE or other remote registry functions. The process limitations (lines 33 through 37) provide some protection against runaway programs. The Max FILE size (line 33) specifies an upper bound for the ulimit parameter.
A user needs some time to devise a good password, and this parameter prevents an unexpected (when the current password expires) demand for a new password. The AUTHENTICATION GRAMMAR (line 18) should be left with the default “compat” value. This will be used with future enhancements for distributed systems. 4, “Passwords” on page 21. We suggest you leave these lines unchanged. Do not enter anything in the REGISTRY (line 32). This is for future use with DCE or other remote registry functions. The process limitations (lines 33 through 37) provide some protection against runaway programs.
This parameter is useful for temporary accounts, such as for visitors or contractors. The account is disabled after the specified date. The ACCOUNT LOCKED field (line 13) is normally false , and can be used as the single point of control to disable a userid. ) You can limit a user to logging in between certain hours by using LOGIN TIMES (line 16). There are several formats for this parameter, and they are explained in the comments in /etc/security/user . Once logged into the system, a user will not be forced off if his session extends beyond his valid hours.