This document, the "ULTRIX Security Guide for Users" (June 1990, for ULTRIX Version 4.0 or higher), aims to educate users with basic ULTRIX experience on how to create and maintain a secure computing environment.
The guide outlines the fundamental aspects of computer security—secrecy, integrity, availability, and accountability—and describes common threats like masquerade and Trojan horse programs. It emphasizes the shared responsibility between users and security administrators in maintaining system security.
Key areas of user responsibility and system features covered include:
Protecting Your Account:
Secure Attention Key
) during login to prevent password theft.last
command) for unauthorized access.Protecting Your Files and Directories:
umask
and modifying existing permissions with chmod
.chgrp
) and organizing files into separate directories for better access control.find
command to identify suspicious or poorly protected files.cp
, mv
, ln
, tar
, cpio
) affect file permissions and ownership.crypt
command to encrypt sensitive information.Processes and Shells:
root
, and advising caution in their creation and use..profile
, .cshrc
) by using absolute pathnames in the PATH variable and setting restrictive permissions on these files.Connecting to Other Systems (Network Security):
rlogin
, ftp
, uucp
, tip
, dcp
)./etc/hosts.equiv
and .rhosts
to prevent unauthorized, passwordless access.Workstation and Windowing Environments (DECwindows):
/etc/X*.hosts
) and personal (.Xdefaults
) access control lists.In summary, the "ULTRIX Security Guide for Users" provides comprehensive guidance and best practices for ULTRIX users to enhance the security of their accounts, files, processes, network interactions, and workstations, stressing the user's active role in maintaining a secure computing environment.
Site structure and layout ©2025 Majenko Technologies