[pc2] I want to use FIM to authenticate users for several applications. Accounts created by FIM are being added to Active Directory with useraccountcontrol equal to 544. The point is that I don't want them to be able to log in Window's domain. If change 544 to 546 would they be able to...
Hello, need to know if my ideas are rigth:
- In a as400 deploy, the user has to have two accounts? one for OS/DB2 and the other for the application JDE by itself?
- User's profile in JDE application is controlled from OS profile or is configured in the application independently?
Thanks!
Hello everyone,
Checking configuration access files of an AIX server, left me wondering this:
- If a user is added to system group, it shares gid=0 with some security risks because it gets some root kind of access level.
- Is this insecure condition is kept if the user has admin variable...
Hi, I need to understand the implication of having an account that support a batch process with special authorities ALLOBJ and/or SECADM. The technichian has not managed to tell me why a batch account would need to have this configuration.
Is different the information you get if you run:
select * from master..sysprotects
than the one you obtain from:
select * from sysprotects ?
I need to ask because I don't have data base to test them, thanks,
Hi, looking at a table of sysloginroles, found several users with sa and sso roles; besides sa and other extra account , isn't it a security problem to find 8 or 7 users with this privileges assigned?
(newbie on sybase)
Hi, the date you get executing ls -alt, regarding directories, is the date when the directory was created or the date of last modification inside directory?
Hi! , reviewing the security configuration of an AS400 server, asked for the output from go sectools to know if there were users with a password equal to the userid. But the system responded as the go sectools command was not found.
The system has Pentasafe for security and auditing, could it...
Hello, I'm looking for a DHCP solution (closed or open source) that would allow me to validate the user against some ldap before give them a valid ip address. What would you recomendme?
Hello everybody, got a list of services that are recomended to set off in Cisco's routers and swtiches:
ip redirects
ip source-route
ip direct-broadcast
cdp run
bootp-server
dhcp-server
ip domain-lookup
proxy-arp
http server
finger
tcp-small-servers
ucp-small-servers
identd
Verifying the IOS...
Looking at the list got from SELECT * FROM SYS.DBA_TAB_PRIVS found lots of tables to which PUBLIC has granted access, like ALL_* for example, but also SESSION_ROLES, SYSTEM_PRIVILEGE_MAP and many others.
Which should be considered to revoke? I guess not all of them but are there any PUBLIC...
Hello, I have been looking for a reference to know which columns you could get running the command:
DSPUSRPRF USRPRF(*ALL) OUTPUT(*PRINT)
But not been able to find out the names and order of the columns. Does anyone hase an idea?
Which the security implication of having the port 523 reachable from any address in my network?
Can I set an access list for this port in the DB configuration?
Are there other ports I should condier to close for normal users?
Running show version, I get:
Cisco PIX Firewall Version 6.3(5)
how can I be sure if the full version is 6.3(5.106) or just 6.3(5)? this regarding the vulnerability: CSCsc14915.
CSCsc14915 -- PIX 6.3 Spoofed TCP SYN packets can block legitimate TCP connections
This Bug ID tracks the issue...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.