NET 4000 Chapter Notes - Chapter 12.2.5: Pluggable Authentication Module, Core Dump, Sydney Trains M Set

50 views2 pages
9 Dec 2017
School
Department
Course
Professor

Document Summary

When considering user security, keep the following in mind: Users should be trained to use strong passwords. Strong passwords use a mixture of numbers and letters (both upper- and lower-case) and are more than. Administrators can limit the resources that users can access. The following table describes commands used to promote user security and restrictions: M sets the maximum number of days before the password expires. W sets the number of days before the password expires that a warning message displays. M sets the minimum number of days that must pass after a password has been changed before a user can change the password again. Look in the /etc/shadow file to view current limits for users. Limit computer resources used for applications launched from the shell. Soft limits can be temporarily exceeded up to the hard limit setting. Users can modify soft limits, but only root can modify hard limits. C limits the size of a core dump file.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents

Related Questions