Sam configuration command overview, sam command Overview

Source: Internet
Author: User
Tags gopher account security

Sam configuration command overview, sam command Overview

./Install_packages -- enhanced_reporting
Katello-configure -- deployment = sam -- user-pass = redhat

Chkconfig mongod on
Service Producer d start
Su-splice-s/bin/sh-c 'ssh-keygen-t rsa-f/var/lib/splice/id_rsa-sat-N ""'
Cat/var/lib/splice/id_rsa-sat.pub

 

RHS:
Useradd swreport
Mkdir/home/swreport/. ssh
Scp sam:/var/lib/splice/id_rsa-sat.pub/home/swreport/. ssh/authorized_keys

Add command = "/usr/bin/spacewalk-report $ SSH_ORIGINAL_COMMAND" to the authorized_keys file"

Chown-R swreport: swreport/home/swreport/. ssh
Chmod 700/home/swreport/. ssh
Chmod 600/home/swreport/. ssh/authorized_keys
Restorecon-R/home/swreport/. ssh
Gpasswd-a swreport apache


SAM:
Su-splice-s/bin/bash
Ssh-I/var/lib/splice/id_rsa-sat swreport@rhs7.example.com splice-export

Vi/etc/splice/checkin. conf


Su-splice-s/bin/bash
Spacewalk-splice-checkin


The more specific the SAM file is, the better.

The SAM file is a file in WIN2000 that stores password information. In windows NT and win2000, security account manager is used for user account security management, the Security Account Manager manages Accounts by using Security Identifiers. Security Identifiers are created at the same time when an account is created. Once an account is deleted, the Security Identifiers are also deleted. The Security ID is unique. Even if the user name is the same, the Security ID obtained at each creation is completely different. Therefore, once an account is deleted, its security id no longer exists. That is, using the same user name to recreate the account will also be assigned different security IDs without retaining the original permissions. The security account manager displays the % SystemRoot % \ system32 \ config \ sam file. The sam file is a user account database of windows NT. All information about the login name and password of the NT user is stored in this file. Sam files can be considered similar to passwd files in unix systems, but they are not so intuitive and clear. Passwd uses the format of saving text to save information. This is an example of linux passwd file content 0: root: 8L7v6: 0: 0: root:/bin/bash 1: bin: *: 1: 1: bin:/bin: 2: daemon: *: 2: 2: daemon:/sbin: 3: adm: *: 3: 4: adm: /var/adm: 4: lp: *: 4: 7: lp:/var/spool/lpd: 5: sync: *: 5: 0: sync:/sbin: /bin/sync 6: shutdown: *: 6: 0: shutdown:/sbin/shutdown 7: halt: *: 7: 0: halt:/sbin: /sbin/halt 8: mail: *: 8: 12: mail:/var/spool/mail: 9: news: *: 9: 13: news: /var/spool/news: 10: uucp: *: 10: 14: uucp:/var/spool/uucp: 11: operator: *: 11: 0 perator:/root: 12: games: *: 12: 100: games: /usr/games: 13: gopher: *: 13: 30: gopher:/usr/lib/gopher-data: 14: ftp: *: 14: 50: FTP User: /home/ftp: 15: nobody: I0iJ.: 99: 99: Nobody:/home/httpd:/bin/bash 16: david: c6CuzM: 500: 500:/home/david:/bin/bash 17: dummy: fIVTl4IgU: 501: 503:/home/dummy:/bin/bash 18: msql :!!: 502: 504:/home/msql:/bin/bash every row in the passwd file in unix represents a user profile. Each account has seven pieces of information, the format of ":" is as follows ...... remaining full text>

How can I configure an IP address for the second Nic when using the sam command in HP UNIX?

Click Start → run → cmd → enter ping and add his IP address-l size-t

The following can be used for reference:
The following describes an intrusion method in WIN9X: 1. Obtain the IP address of the other party, for example, XX. XX. The method is too much to elaborate on. 2. determine where the peer accesses the Internet. Open a DOS window and type tracert xx. XX 4th and 5th lines to indicate that the Peer's Internet location is used. 3. obtain the name of the Peer computer. In the DOS window, type NBTSTAT-a xx. XX. XX. XX: the first line is the name of the Peer computer. The second line is the name of the Peer computer. The third line is the description of the Peer computer. there is a file named LMHOSTS in the Windows directory. SAM, rename it LMHOSTS, delete its content, and write the IP address and computer name of the other party to the file in the following format: XX. XX. XX. XX computer name 5. open the DOS window and type NBTSTAT-R 6. enter the name of the Peer computer in start-search-computer, and click the peer computer to enter. Do not use the above methods in disorder. I am not responsible for the troubles caused by the above methods. Please be careful. The best way to deal with the above attack is to hide your IP address.

Ping command usage
?? Ping is a frequently used utility used to determine whether a local host can exchange (send and receive) data packets with another host. Based on the returned information, you can infer whether the TCP/IP parameter is set correctly and whether the operation is normal. Note: successful one or two datagram exchanges with another host do not mean that the TCP/IP configuration is correct, you must exchange data between a large number of local hosts and remote hosts to ensure the correctness of TCP/IP.
?? To put it simply, Ping is a test program. If the Ping runs correctly, you can eliminate faults in the network access layer, Nic, MODEM input/output lines, cables, and routers, this reduces the scope of the problem. However, Ping can also be used as a DDOS (Denial of Service Attack) tool by someone with ulterior motives to customize the size and endless high-speed transmission of the datagram, some time ago, Yahoo was paralyzed by hackers using hundreds of computers that can access the Internet at high speed to send a large number of Ping data packets consecutively.
?? According to the default settings, the Ping command on Windows sends four ICMP (inter-network control packet protocol) Send back requests, each 32 bytes of data, if everything is normal, you should receive four replies.
?? Ping can display the time between sending a return request and returning a return response in milliseconds. If the response time is short, the datagram does not have to pass through too many routers or network connections. Ping can also display the TTL value. You can use the TTL value To estimate the number of routers that the data packet has passed: the start value of the TTL at the source location (that is, a 2th percentile value that is slightly greater than the returned TTL)-the TTL value returned. For example, if the returned TTL value is 119, the initial TTL value of the outbound data packet from the source address is 128, and the source point to the target location must pass 9 vro network segments (128-119 ); if the returned TTL value is 246, the start value of TTL is 256, and the source and target locations must pass through nine vro network segments.
Typical order of network faults detected by Ping
?? Under normal circumstances, when you use the Ping command to find the problem or check the network running status, you need to use many Ping commands. If all of them are running correctly, you can trust that the basic connectivity and configuration parameters are correct. If some Ping commands fail, it can also specify where to locate the problem. The following describes a typical detection sequence and possible faults:
Ping 127.0.0.1 -- the Ping command is sent to the IP address software of the local computer. This command will never exit the computer. If this is not done, it indicates that the installation or running of TCP/IP has some basic problems.
Ping the IP address of the Local Machine -- this command is sent to the IP address configured on your computer. Your computer should always Ping the IP address... the remaining full text>
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.