<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Manuals in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457007#M12852</link>
    <description>Try this:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.docs.hp.com/dynaweb/hpux10/inssen0a/b677/@Generic__BookView" target="_blank"&gt;http://www.docs.hp.com/dynaweb/hpux10/inssen0a/b677/@Generic__BookView&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;federico</description>
    <pubDate>Tue, 24 Oct 2000 10:36:40 GMT</pubDate>
    <dc:creator>federico_3</dc:creator>
    <dc:date>2000-10-24T10:36:40Z</dc:date>
    <item>
      <title>Manuals</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457006#M12851</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;I have converted my system to a trusted system. Do you know of where I can get some reading material on features and on how to setup various things on a trusted system?&lt;BR /&gt;&lt;BR /&gt;Stephen&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Oct 2000 10:28:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457006#M12851</guid>
      <dc:creator>Stephen Hughes</dc:creator>
      <dc:date>2000-10-24T10:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Manuals</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457007#M12852</link>
      <description>Try this:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.docs.hp.com/dynaweb/hpux10/inssen0a/b677/@Generic__BookView" target="_blank"&gt;http://www.docs.hp.com/dynaweb/hpux10/inssen0a/b677/@Generic__BookView&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;federico</description>
      <pubDate>Tue, 24 Oct 2000 10:36:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457007#M12852</guid>
      <dc:creator>federico_3</dc:creator>
      <dc:date>2000-10-24T10:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: Manuals</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457008#M12853</link>
      <description>Hi. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;For Trusted System there is also some good information  on the &lt;A href="http://docs.hp.com" target="_blank"&gt;http://docs.hp.com&lt;/A&gt; the following manual:&lt;BR /&gt;Select  &lt;BR /&gt;        -&amp;gt;   HP-UX 10.x Operating System  (on main menu)&lt;BR /&gt;                 -&amp;gt; System Administration   (area)&lt;BR /&gt;                        -&amp;gt; HP-UX System Administration Tasks (HP-UX 10.x)    (manual)&lt;BR /&gt;                                -&amp;gt;   Managing System Security   (entire chapter on trusted system)&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Oct 2000 10:56:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457008#M12853</guid>
      <dc:creator>Nancy Hubert</dc:creator>
      <dc:date>2000-10-24T10:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Manuals</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457009#M12854</link>
      <description>Recently HP sent following "Technical Tips":&lt;BR /&gt;&lt;BR /&gt;Document ID:  2100067383&lt;BR /&gt;Date Loaded:  20001014&lt;BR /&gt;      Title:  UNIX: comparing trusted and non-trusted systems&lt;BR /&gt;&lt;BR /&gt;PROBLEM&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please inform as to the differences between trusted and non-trusted UNIX&lt;BR /&gt;systems.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;CONFIGURATION&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Operating System - HPUX&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;RESOLUTION&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The following is a list of differences between trusted and non-trusted&lt;BR /&gt;systems:&lt;BR /&gt;&lt;BR /&gt;     1)  A trusted system allows system auditing to be turned on.  System&lt;BR /&gt;         auditing enables the ability to trace every system call issued by&lt;BR /&gt;         each user on the system.  Non-trusted systems run with system&lt;BR /&gt;         auditing disabled.&lt;BR /&gt;&lt;BR /&gt;     2)  Trusted systems have improved password management.  Below is a list&lt;BR /&gt;         of features of this password management:&lt;BR /&gt;&lt;BR /&gt;              a. Specification of a grace period and expiration period for&lt;BR /&gt;                 passwords.&lt;BR /&gt;&lt;BR /&gt;              b. The ability to specify system-wide password aging.&lt;BR /&gt;&lt;BR /&gt;              c. The ability to specify an absolute account life.&lt;BR /&gt;&lt;BR /&gt;              d. The ability to disable accounts after repeated login&lt;BR /&gt;                 failures.&lt;BR /&gt;&lt;BR /&gt;              e. Passwords lengths of up to forty (40) characters.&lt;BR /&gt;&lt;BR /&gt;              f. The ability to access a random password generator.&lt;BR /&gt;&lt;BR /&gt;     3)  Trusted systems also have additional login restrictions, while&lt;BR /&gt;         non-trusted systems do not.  Below are the features of&lt;BR /&gt;         trusted system login restrictions:&lt;BR /&gt;&lt;BR /&gt;              a. In addition to account disabling, the account may also be&lt;BR /&gt;                 locked.&lt;BR /&gt;&lt;BR /&gt;              b. Setting accounts to be accessed only at certain times of&lt;BR /&gt;                 the day.&lt;BR /&gt;&lt;BR /&gt;              c. The ability to specify account location access.  In other&lt;BR /&gt;                 words, account access at specific devices, workstations, etc.&lt;BR /&gt;&lt;BR /&gt;              d. The ability to specify a single-user boot password.&lt;BR /&gt;&lt;BR /&gt;              NOTE: These login restrictions are NOT available on&lt;BR /&gt;                       NON-TRUSTED systems.&lt;BR /&gt;&lt;BR /&gt;     4)  A trusted system has shadowed passwords, while a non-trusted system&lt;BR /&gt;         does not.  Shadowed passwords are kept in locations other than&lt;BR /&gt;         /etc/passwd.  This prevents users from viewing the /etc/passwd&lt;BR /&gt;         file and determining which accounts do not have passwords.  This&lt;BR /&gt;         also prevents hackers from running "password cracker programs"&lt;BR /&gt;         against passwords in the /etc/passwd file.&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Oct 2000 11:16:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manuals/m-p/2457009#M12854</guid>
      <dc:creator>Thomas Schler_1</dc:creator>
      <dc:date>2000-10-24T11:16:08Z</dc:date>
    </item>
  </channel>
</rss>

