<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Backdoors in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714460#M757349</link>
    <description>There are plenty of holes if you're running insecure or unpatched system.  Here's a few:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.ciac.org/ciac/bulletinsByType/vndr_hp_bulletins.html" target="_blank"&gt;http://www.ciac.org/ciac/bulletinsByType/vndr_hp_bulletins.html&lt;/A&gt;</description>
    <pubDate>Tue, 30 Apr 2002 20:57:48 GMT</pubDate>
    <dc:creator>Christopher Caldwell</dc:creator>
    <dc:date>2002-04-30T20:57:48Z</dc:date>
    <item>
      <title>Backdoors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714458#M757347</link>
      <description>Are there any known backdoor programs associated with HP-UX 11i? [Similar to backdoor leapfrog]</description>
      <pubDate>Tue, 30 Apr 2002 19:29:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714458#M757347</guid>
      <dc:creator>Anu Lanka</dc:creator>
      <dc:date>2002-04-30T19:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: Backdoors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714459#M757348</link>
      <description>leapfrog is an M$ (micro-soft) issue, and because it's so easy to get users to click on attachments in M$ OS's it's easy to get these things installed.&lt;BR /&gt;&lt;BR /&gt;I would imagine that you could have users install ROGUE processes, but they could only assume that users access priviledges, and they would have to explicitly install them. Now if a root user was to install a trojan horse, well shame on them!&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 30 Apr 2002 19:34:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714459#M757348</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-04-30T19:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Backdoors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714460#M757349</link>
      <description>There are plenty of holes if you're running insecure or unpatched system.  Here's a few:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.ciac.org/ciac/bulletinsByType/vndr_hp_bulletins.html" target="_blank"&gt;http://www.ciac.org/ciac/bulletinsByType/vndr_hp_bulletins.html&lt;/A&gt;</description>
      <pubDate>Tue, 30 Apr 2002 20:57:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714460#M757349</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2002-04-30T20:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Backdoors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714461#M757350</link>
      <description>Like any non-trivial operating system, there are going to be exploits. However, there is virtually nothing in HP-UX that is similar to any version of PC Windows.  HP-UX is shipped in an open state for the most part and you must take explicit steps to secure the operating system PRIOR to connecting it to a network.  The changes may be simple modifications to /etc/profile, to turning off network daemons to installing IDS/9000...the steps are very dependent on your environment.</description>
      <pubDate>Tue, 30 Apr 2002 22:00:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714461#M757350</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2002-04-30T22:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: Backdoors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714462#M757351</link>
      <description>Hi Anu,&lt;BR /&gt;&lt;BR /&gt;you could read the "bastion host" script to get information about what to close down to make your system more secure...&lt;BR /&gt;&lt;BR /&gt;Get it from there:&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Wodisch&lt;BR /&gt;</description>
      <pubDate>Tue, 30 Apr 2002 23:33:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714462#M757351</guid>
      <dc:creator>Wodisch</dc:creator>
      <dc:date>2002-04-30T23:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Backdoors</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714463#M757352</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;hpux has its security issues and has rightly been pointed out is shipped in an open state.&lt;BR /&gt;&lt;BR /&gt;however it is still much more than secure than NT , now what did Bill Gates say NT stands for yes I remeber "No Trust"&lt;BR /&gt;&lt;BR /&gt;cheers&lt;BR /&gt;John.</description>
      <pubDate>Wed, 01 May 2002 06:28:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/backdoors/m-p/2714463#M757352</guid>
      <dc:creator>John Carr_2</dc:creator>
      <dc:date>2002-05-01T06:28:42Z</dc:date>
    </item>
  </channel>
</rss>

