Visitors: 19688538

Latest Articles

Blogs

AIX Security Technologies
User Rating: / 0
AIX: Security

This will be a series of short articles - as a spin-off of the CIS Benchmark for AIX 7.2. That is, this started as a section for the benchmark - no recommendations intended - as a quick study for people not used to day-to-day administration or work on an AIX system.

Currently, it consists of at least 10 sub-sections - each describing one (aspect of) a security mechanism. There will be a lot of re-writing - and, likely, as not really on-topic for a security benchmark recommendation or guide - the information will need a seperate home. I cannot think of a better place than RootvgNet.

So, what are we looking at:

  1.  Security Profile Evaluation Assurance
  2. AIX Security Expert
  3. Access Control Mechanisms
  4. Discretionary Access Control (inode based)
  5. Access Control Lists (AIXC and NFS4)
  6. Enhanced RBAC
  7. Logging Mechanisms
  8. Encryption
  9. IPSEC (IP Security)
  10. Trusted Executition
This is likely more to come - I can cut/paste some of the material I have already started. As I do, I'll update the list above so that it points to the new material.
Last Updated ( Tuesday, 09 November 2021 )
 
How to spot differences in OpenSSH
User Rating: / 1
AIX: Security

There are ways to spot differences of ssh and sshd. Here are just a few.

And I hope you find the differences easy to spot and maybe even enlightening!

Last Updated ( Wednesday, 03 May 2017 )
Read more...
 
AIX Features: "From Strength to Strength"
User Rating: / 0
AIX: What's New

The document kept moving - hopefully the URL will be stable - and the content will be kept up to date!

 AIX "From Strength to Strength"


Last Updated ( Wednesday, 24 November 2021 )
 
<< Start < Prev 1 2 Next > End >>

Results 1 - 3 of 4

Legacy PDFs

AIX 5.2
AIX 5.1