On Thu, Sep 06, 2012 at 02:40:47PM -0400, Rich Pieri wrote:
On Thu, 6 Sep 2012 12:49:17 -0500
Derek Martin inva...@pizzashack.org wrote:
Clear and present? Not in any computing environment I've ever managed
or worked in. Most companies don't need this kind of security, and as
I said,
I have a RHEL 5.6 workstation configured with samba3x to authenticate
to a Windows 2008 AD environment (net ads join) so the workstation
appears as a Windows box that has joined the domain.
Now, any user can ssh into it with their AD credentials, and
/etc/passwd has no knowledge of their
This is a bit off topic, but does anyone know of a computer projector
(multiple video/VGA inputs) that are Common Criteria/EAL approved,
specifically for proper signal isolation among the video inputs?
Thanks in advance.
Scott
___
Discuss mailing list
Basically I am of the walking away and not bothering variety. I think
that in an enclosed office environment with coworkers, this lapse of
security is ok. A coworker of mine in Toronto got gigged a couple of
weeks ago because he did not comply with the security policy and either
left his laptop
We have a similar issue as we moved from a locally administrated NIS to
a globally administered LDAP (administered in Ottawa). While I can get
the shell changed by emailing one of the IT guys in Toronto it is the
same issue. (There are LDAP tools on the system to do this but the LDAP
database is
Boston Linux Installfest XLV
When: Saturday September 8, 2012 from 9:00 am to 5:00 pm
Where: MIT Building E-51, Room 061
2 Amherst St, Cambridge
Plenty of free parking in front of the building.
http://mitiq.mit.edu/mitiq/directions_%20parkinge51.htm
What you need
On Fri, 7 Sep 2012 04:48:03 -0500
Derek Martin inva...@pizzashack.org wrote:
No, I asked for a *likely* example, where the cost was justified by
the threat. You didn't provide one, and I offered simple counters for
MIT's Athena clusters.
--
Rich P.
To elaborate a bit, Project Athena doesn't use encrypted home
directories but it does use Kerberos and AFS to provide a degree of
security. Even so, there is a formal policy of 20 minutes away from a
workstation:
If you are using a workstation in one of the Athena clusters and
intend to keep
We have a couple positions open for both Sr Jr Linux/Network System
Engineers. Below is the description of the Sr position. Please contact me
directly if interested.
Location: South Boston (near South Station)
Compensation: commensurate with experience
Benefits: Medical, Dental, Vision,
In the .bashrc put/bin/tcshexit - Original Message -From:
quot;Scott Ehrlichquot; ;srehrl...@gmail.com
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss
On Sunln -s /bin/sh /bin/bash (or whatever it is)- Original Message
-From: quot;Jerry Feldmanquot; ;g...@blu.org
___
Discuss mailing list
Discuss@blu.org
http://lists.blu.org/mailman/listinfo/discuss
I think it is a bad practice to symlink (or hardlink) /bin/sh to bash,
especially on a commercial Unix system. Basically, the Bourne Shell and
the BASH shell have different behaviors. You are much, much better off
installing the BASH shell on a commercial Unix system.
On 09/07/2012 03:09 PM,
On 09/07/2012 03:08 PM, j...@polcari.com wrote:
In the .bashrc put/bin/tcshexit - Original Message -From:
quot;Scott Ehrlichquot; ;srehrl...@gmail.com
I somewhat disagree here. I would place the /bin/tcsh in the ~/.profile
or in the ~/.bash_profile.
The .bash_profile and .profile
On Fri, Sep 07, 2012 at 11:34:14AM -0400, Rich Pieri wrote:
To elaborate a bit, Project Athena doesn't use encrypted home
directories but it does use Kerberos and AFS to provide a degree of
security. Even so, there is a formal policy of 20 minutes away from a
workstation:
If you are using
On Fri, Sep 07, 2012 at 07:34:52AM -0400, Jerry Feldman wrote:
We have a similar issue as we moved from a locally administrated NIS to
a globally administered LDAP (administered in Ottawa). While I can get
the shell changed by emailing one of the IT guys in Toronto it is the
same issue. (There
On Fri, 7 Sep 2012 18:03:01 -0500
Derek Martin inva...@pizzashack.org wrote:
Sure, colleges typically do this not so much for authentication or
authorization reasons, but for resource availabilty reasons. You
You practically demanded an example where this kind of policy was
enforced. You got
On Fri, Sep 07, 2012 at 07:52:28PM -0400, Rich Pieri wrote:
I have an even better example: Active Directory with roaming profiles.
Active Directory is MIT Kerberos + LDAP + DNS, the same authentication
system used by Athena.
Horse be damned, I think you're still missing the point. It's what
On Fri, 7 Sep 2012 20:51:32 -0500
Derek Martin inva...@pizzashack.org wrote:
Horse be damned, I think you're still missing the point. It's what
you're protecting, how accessible and available it is, and it's value,
that matters... not so much what solutions you're using to protect it
(unless
On Fri, 07 Sep 2012 22:37:07 -0400
Robert Krawitz r...@alum.mit.edu wrote:
So answer this: if one of your users has to run a job that's going to
take several hours (or several days) to complete, does that mean that
they have to stay at their desks for that entire time, not even taking
meal or
19 matches
Mail list logo