|Paid content will be excluded from the download.
| Matches : 78717
|The rexec service must be disabled. The rexec service does not implement crypto and has had several security vulnerabilities in the past. It is disabled by default; enabling it would increase the attack surface of the system. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD n ...
The telnet service must be disabled, as it sends all data, including the user's password in a clear text form that can be easily intercepted and read. Passwords need to be protected at all times and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Disabling telnet is one way to mitigate t ...
Enable or disable the tftp daemon as appropriate. Use launchctl unload -w to unload the tftp.plist file in the LaunchDaemons directory.
Web Sharing is non-essential and must be disabled. Enabling any service increases the attack surface for an intruder. By disabling unnecessary services, the attack surface is minimized.
The default global umask setting must be set to '027' for user applications. The setting '027' ensures that user created files and directories will be readable, but not writable, by users that share the same group id. Users with a different group id will not be able to read or write those files. This mitigates the risk that unauthorized users might be able to read and write files saved to the syst ...
The owner of the ipcs executable must be root. The ipcs utility provides information on System V interprocess communication (IPC) facilities on the system.
The group of the ipcs executable must be root. The ipcs utility provides information on System V interprocess communication (IPC) facilities on the system.
The permissions of the ipcs executable should be set as appropriate. The ipcs utility provides information on System V interprocess communication (IPC) facilities on the system.
The owner of the rcp executable must be root. The rcp utility copies files between machines.
The permissions of the rcp executable must be set as appropriate. The rcp utility copies files between machines.
Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   7871
© 2013 SecPod Technologies