Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. BeatrixKiddo

    Deny logon locally & Useraccouncontrol

    If a user has useraccountcontrol=512 can it logon into domain even I set "Deny logon locally" policy?[shadeshappy]
  2. BeatrixKiddo

    useraccountcontrol + FIM

    [pc2] I want to use FIM to authenticate users for several applications. Accounts created by FIM are being added to Active Directory with useraccountcontrol equal to 544. The point is that I don't want them to be able to log in Window's domain. If change 544 to 546 would they be able to...
  3. BeatrixKiddo

    JDE Profiles

    Hello, need to know if my ideas are rigth: - In a as400 deploy, the user has to have two accounts? one for OS/DB2 and the other for the application JDE by itself? - User's profile in JDE application is controlled from OS profile or is configured in the application independently? Thanks!
  4. BeatrixKiddo

    Confused

    Hello everyone, Checking configuration access files of an AIX server, left me wondering this: - If a user is added to system group, it shares gid=0 with some security risks because it gets some root kind of access level. - Is this insecure condition is kept if the user has admin variable...
  5. BeatrixKiddo

    Implications

    Hi, I need to understand the implication of having an account that support a batch process with special authorities ALLOBJ and/or SECADM. The technichian has not managed to tell me why a batch account would need to have this configuration.
  6. BeatrixKiddo

    Profile changed

    Hi, if I need to know the date/hour of each time a profile was changed; where can I look at?
  7. BeatrixKiddo

    select * from master..sysprotects

    Is different the information you get if you run: select * from master..sysprotects than the one you obtain from: select * from sysprotects ? I need to ask because I don't have data base to test them, thanks,
  8. BeatrixKiddo

    sa_role and sso_role

    Hi, looking at a table of sysloginroles, found several users with sa and sso roles; besides sa and other extra account , isn't it a security problem to find 8 or 7 users with this privileges assigned? (newbie on sybase)
  9. BeatrixKiddo

    Date stamp and directories

    Hi, the date you get executing ls -alt, regarding directories, is the date when the directory was created or the date of last modification inside directory?
  10. BeatrixKiddo

    Security Best Practices

    Hello, has anyone audited security in Websphere? which key points should be verified?
  11. BeatrixKiddo

    No sectools

    Hi! , reviewing the security configuration of an AS400 server, asked for the output from go sectools to know if there were users with a password equal to the userid. But the system responded as the go sectools command was not found. The system has Pentasafe for security and auditing, could it...
  12. BeatrixKiddo

    Auditing Progress Database

    Good day, where can I get information of how to audit a Progress Database?
  13. BeatrixKiddo

    ONLINE_TABLE_MOVE

    Does any one what is table SAPTOOLS.ONLINE_TABLE_MOVE for?
  14. BeatrixKiddo

    Authentication the user first

    Hello, I'm looking for a DHCP solution (closed or open source) that would allow me to validate the user against some ldap before give them a valid ip address. What would you recomendme?
  15. BeatrixKiddo

    DHCP

    HI! Configuring DHCP on Windows 2003, how can I control who gets an IP address? because right now anyone that connects to a port gets an IP.
  16. BeatrixKiddo

    Disabled by defult

    Hello everybody, got a list of services that are recomended to set off in Cisco's routers and swtiches: ip redirects ip source-route ip direct-broadcast cdp run bootp-server dhcp-server ip domain-lookup proxy-arp http server finger tcp-small-servers ucp-small-servers identd Verifying the IOS...
  17. BeatrixKiddo

    PUBLIC

    Looking at the list got from SELECT * FROM SYS.DBA_TAB_PRIVS found lots of tables to which PUBLIC has granted access, like ALL_* for example, but also SESSION_ROLES, SYSTEM_PRIVILEGE_MAP and many others. Which should be considered to revoke? I guess not all of them but are there any PUBLIC...
  18. BeatrixKiddo

    DSPUSRPRF USRPRF(*ALL) OUTPUT(*PRINT)

    Hello, I have been looking for a reference to know which columns you could get running the command: DSPUSRPRF USRPRF(*ALL) OUTPUT(*PRINT) But not been able to find out the names and order of the columns. Does anyone hase an idea?
  19. BeatrixKiddo

    523 port

    Which the security implication of having the port 523 reachable from any address in my network? Can I set an access list for this port in the DB configuration? Are there other ports I should condier to close for normal users?
  20. BeatrixKiddo

    6.3(5.106)

    Running show version, I get: Cisco PIX Firewall Version 6.3(5) how can I be sure if the full version is 6.3(5.106) or just 6.3(5)? this regarding the vulnerability: CSCsc14915. CSCsc14915 -- PIX 6.3 Spoofed TCP SYN packets can block legitimate TCP connections This Bug ID tracks the issue...

Part and Inventory Search

Back
Top