security policies implementation I

Posted on 2006-07-01
Medium Priority
Last Modified: 2010-04-11
thanks you have shown me a path to proceed in some direction, but i have to implement an interface in VB.NET with number of security policies of my so called organization, cant i can use output of WMIC which is in XML, in my VB.net programme,  and other settings i have to do related to Spam Filter e.g. Spamassassin and settings related to Content Filter like DansGuardian web content filter, could you help me findind to change configurartion from window box to linux box of these Linux application
Question by:rahulrai19
  • 2
LVL 38

Expert Comment

by:Rich Rumble
ID: 17027231
I was surprized to have recieved an accepted answer on the last question:
I'm not sure I understand.

You want to create an interface, to look at, and possibly change security settings on your organizations PC's?
If you want to filter web-content, like url filters and such, a proxy server is the way to go. You can either use a white-list approach, allow users only to sites you specify... or a black-list approch, allow users to all sites, except those that you specify. Spamassassin settings are easily copied from one machine to another.

This part I don't understand:
" could you help me findind to change configurartion from window box to linux box of these Linux application"

Author Comment

ID: 17030072
This part I don't understand:
" could you help me findind to change configurartion from window box to linux box of these Linux application"

i am just trying to say " how could i implement change in settings in WIndow box for application like spamassisssn and Dauguardian content filter in Linux box?" just that

Author Comment

ID: 17030082
" could you please sugggest me some information source where anybody tries to implement same things that i m trying to do so that i could get some information regarding my work?
LVL 18

Accepted Solution

decoleur earned 1000 total points
ID: 17030316
hello rahulrai19-

I think that what you are asking for is recomendations on how to manage your linux applications using a windows machine, right?

It really depends on how the linux applications are being run and maintained. Some have Web front ends, some are managed with text files and the command line and others are managed will a graphical user interface.

I do not think that you will be able to write a VB interface that runs on the linux box, but what you could do is run a VB interface that accesses the linux box and runs remote commands. you would just have to make the appropriate requests from a VB enabled machine of web services or the command line on the linux box.

personally I think you are adding an unecessary layer of complexity to this process, because you are not only going to have to be maintaining the security applications but you will have to maintain your own interfaces to those applications.

if you really need to manage your linux services from a windows machine, i would look more at running client software that enables you remote access to the linux machines like realVNC for "desktop" access or puTTY for "CLI" access.

hope this helps,


Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Super Bowl is just days away. Millions of advertising dollars will be spent in just a few hours to drive people to websites around the globe. Optimizing your site in anticipation of a big event like this (and the traffic surges that follow) will…
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question