Learn about solaris certified system administrator, we have the largest and most updated solaris certified system administrator information on alibabacloud.com
1 IntroductionI have a binary file that is a program that cannot be executed on Ubuntu system and the results obtained by using the file command are:Graphgen:elf 32-bit MSB executable, SPARC, version 1 (SYSV), dynamically linked (uses shared libs), not strippedBased on the above tips, I thought about installing the Soloari SPARC series operating system on Virtual box VMS because the hints above are binaries
The most important thing for system security problems is to install patches, install security tools, and uninstall problematic software in a timely manner. In a Windows operating system, you can install or uninstall the software through "Control Panel → Add/delete programs", and the patches can also be automatically updated, however, in the Solaris
Source: hacker Base
The rapid development of the Internet brings great convenience to people, but the network security problem is becoming increasingly serious. Although the Solaris system is widely used, it cannot avoid security issues. The continuous release of system patches in the corresponding versions proves this.
In addition, such as securit
As a system administrator, we often encounter the need to increase or shrink a file system. For the mainstream OS and Linux on UNIX, dynamic Logical Volume management (LVM) is a great help for us to do this job. But for Solaris systems that do not support LVM, they can only be implemented in a stupid way.
Assuming a w
Solaris System Security reinforcement list ps: as many Solaris Security reinforcement lists are old, the Solaris System reinforcement list summarized in the following documents and practices will inevitably affect the service) and errors and deficiencies, I hope you will not
Or we can look at these two articles:
Http://www.bkjia.com/Article/200508/6185.html,http://www.bkjia.com/Article/200507/5953.html
Source: amxkus blog
I. Security Philosophy1. Security risks come from within the enterprise.2. Administrator requirements: Do not trust anyone3. layered protection policy: assume that some security protection layers are completely invalid.4. Minimize services5. Make plans for the worst case
Ii. Physical Security1. Record th
Control, users can use uid = 0 to execute commands such as/etc/security/bsmconv. However, these commands are shell programs that use a large number of commands in relative paths:
....
PROG = bsmconv
STARTUP =/etc/security/audit_startup
DEVALLOC =/etc/security/device_allocate
DEVMAPS =/etc/security/device_maps
TEXTDOMAIN = "SUNW_OST_OSCMD"
Export TEXTDOMAIN
Permission ()
{
WHO = 'id | cut-f1-d "" '# If [! "$ WHO" = "uid = 0 (root)"]
Then
Form = 'gettext "% s: ERROR: you must be super-user to
Claiming to be a Solaris system administrator, you should understand the Solaris Cryptography system:
The Solaris OS cryptographic Framework (SCF) cryptographic system provides users w
As a system administrator, we often encounter the need to increase or decrease a file system. Dynamic Logical Volume Management (LVM) is a great help for the mainstream OS and Linux on UNIX. However, Solaris Systems that do not support LVM can only be implemented in a stupid way.
Assuming a work scenario, I need to add
the allocation and collection of the data blocks. There may also be a process swap at the end of the file system, which retains the image of the process swapped into memory, which is not part of the file system jurisdiction. Believe that through the above text, the brothers should have a general understanding of the file system.
In order to improve the operatin
software on the LINUX platform. In short, the more knowledge about LINUX, the better.
Tip 2: If you can, you 'd better be familiar with as many operating systems as possible. This is very important. Many friends may think that as a LINUX system administrator, you only need to be proficient in LINUX. In fact, LINUX provides network services, and many other operating systems may act as clients. Therefore,
lights of these devices and determine whether a hardware fault has occurred. Generally, a small fault occurs. After the device is switched OFF and restarted, most of them will be automatically ruled out.Most real problems need to be solved by the vendor. That is to say, the key to getting started is to master the host system that accounts for 1/5 of the total, so that you can easily deal with them.Of course, you may make some configuration changes on
This article is not about a cainiao Linux exploration note, but about the troubles of an old Unix System Administrator when using Ubuntu. Most of the system administrators who log in between 1980s and 1990s are familiar with Unix systems. With the popularity of x86 servers and Linux, it is only a matter of time for most Unix
application.
The persistence layer (data access layer), the business logic layer, the presentation layer and the expression layer adopt the MVC architecture pattern, differentiate into the model, the view, the control three parts
Outlines how you can import Internet traffic into a subnet.
Nat principle
Do you know anything about virtualization? Does it use?
Virtualization refers to virtualizing a computer into multiple logical computers through virtualization technology.
What is the
15 practical Linux/Unix tape management commands for the system administrator
Tape equipment should only be used for regular file archiving or data is transferred from one server to another. Generally, tape devices are connected to Unix machines and controlled by mt or MTCs. We strongly recommend that you back up all data to disks (maybe in the cloud) and tape devices at the same time. In this tutorial, you
controlComputerHardwarewith theSoftwareof ResourcesComputerprogram, is run directly on the "Bare Metal"On the most basicsystem software, any other software must beOperating Systemsupport to run. Operating system boards to include:Process management (processing management), memory management, filesystem (file system), network communication (Networking), security, user interface interface), drivers (devicedr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.