September 2015
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
282930  

Categories

September 2015
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
282930  

Hardening RHEL 7.1

Secure passwords

Passwords are the primary method that Red Hat Enterprise Linux 7 uses to verify a user’s identity. This is why password security is so important for protection of the user, the workstation, and the network.

By default RHEL uses shadow passwords which eliminate this type of attack by storing the password hashes in […]

solaris hardening reference

[gview file=”http://rmohan.com/wp-content/uploads/2015/09/Solaris_Build2.pdf”]

Shell script arrays Syntax error: “(” unexpected

Recently when I am using arrays in a script I got the error message as “Shell script arrays Syntax error: “(” unexpected”.

$ sh arrays.sh #In arrays.sh script I defined some arrays trying to extract values form it

The out put I got after running the script is below

Shell script arrays Syntax error: “(” […]

Securing Solaris

Protect your system from internal & external security vulnerabilities

Introduction Solaris security broadly falls under two groups – one is where the system is accessible using local area network/vlan and it has to be secured against unauthorized access. Second is system is accessible over the Internet to a number of persons and it has to […]

Solaris hardening

1. Purpose of OS Hardening

Computers and network elements connected to networks are vulnerable to attacks. The following is a list of commonly known types of attacks:

1. Viruses, worms, backdoors and trojans?2. Wire tapping and sniffing?3. Password cracking?4. Exploits of known vulnerabilities such as software buffer overflow 5. Denial of services (DOS)

Some of […]