Solved

security

Posted on 2001-08-31
7
236 Views
Last Modified: 2013-12-27
hi

may I know where can I find a reference regarding security for Sun Solaris 7. More sepecifically, I'd like to know the function of every services in /etc/inetd.conf, /etc/rc2.d and /etc/rc3.d

It is because I may want to disable all unnecessary services in order to improve the security of my server.

thanks
brandon
0
Comment
Question by:brandonngst
7 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6448058
if there is no additional software installed which requires inetd, you usually can comment out all services in /etc/inetd.conf.
Keep in mind that not all services are run by inetd, some are installed to run as daemon from the rc-scripts at boot time.
Sun's AnswerBook may be a good reference for information.
0
 
LVL 38

Expert Comment

by:yuzh
ID: 6449574
Hi brandonngst,

    Please  have a look at the following website:

    http://www.itworld.com/Comp/2377/security-faq/

    Which will give you some idea what to do with Solaris.

    Cheers!
0
 
LVL 1

Expert Comment

by:filiep
ID: 6449959
Hi Brandonngst,

try next link :
http://www.sabernet.net/papers/Solaris.html

F.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:brandonngst
ID: 6450172
hi yuzh and filiep

i had been visited the links you sugguested for me. There wasn't any detail regarding every services in /etc/inetd.conf, /etc/rc2.d and /etc/rc3.d

anyway, thanks for your info

best regards
brandon
0
 

Expert Comment

by:ido_br
ID: 6540706
One of the best articles which summerizes the security actions you need to take, and has a devoted section to inetd services is located on SUN's website.

I'm sure you will find there what you are looking for and much more.

Enjoy

Ido

http://wwwwswest.sun.com/blueprints/0401/security-updt1.pdf
0
 
LVL 20

Expert Comment

by:tfewster
ID: 8051583
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- PAQ & refund points

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 

Accepted Solution

by:
SpideyMod earned 0 total points
ID: 8100190
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
error while running the scirpt 24 125
SSH commands for Nas4free 21 381
Host issue and need to move VM's 2 245
FTP on FreeBSD server 2 114
Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now