Handling Passwords with Security and Reliability in Background Processes

نویسنده

  • Don Libes
چکیده

Traditionally, background automation of interactive processes meant giving up security and reliability. With the advent of software such as Expect for controlling interactive processes, it has become possible to improve reliability and security with relative ease. This paper reviews the reliability aspects but focuses primarily on the security aspects, presenting several non-obvious techniques for dealing with passwords and other sensitive information in background processes. These techniques require no changes to existing programs and no new security systems are necessary. With the appropriate tools and examples, these techniques can be applied with surprisingly little effort to a wide variety of problems. Reprinted from the Proceedings of the Eighth Systems Administration Conference (LISA VIII), San Diego, California, September 19-23, 1994. Using Expect it is possible to script telnet, ftp, rlogin, rz/sz, and numerous other programs. Many of these tasks fall in the domain of system administration. For example, a system administrator creating thousands of accounts each semester will find an automated passwd program much more convenient than having to type in each password manually. The following script is another example, driving the fsck program so that one class of questions is answered “yes” while another is answered “no”. If anything else appears, control is temporarily turned over to a user to answer it.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Improving Security of E- Commerce application by using Multifactor Authentication

All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non -repudiation. The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been a popular topic among secur...

متن کامل

The impact of customer relationship management on improving internal processes, customer satisfaction and profitability (case study: the Branches of Esfahan Social Security Organization)

The aim of this study is identifying and modeling the most important internal and external organizational factors in successful implementation of customer relationship management system in the Social Security Organization and its impact on improving internal processes, customer satisfaction and profitability. The research statistical population included senior managers and experts of Esfahan So...

متن کامل

Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system

There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data f...

متن کامل

Reliability Measures Improvement and Sensitivity Analysis of a Coal Handling Unit for Thermal Power Plant

The present paper investigates the reliability and sensitivity analysis of a coal handling unit of a thermal power plant using a probabilistic approach. Coal handling unit is the main block of a thermal power plant and it is necessary for a good function of a power plant that its power supply, which is dealt in coal handling unit, must function continuously without any obstacle. The configurati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994