Michael AM Felt

Michael AM Felt




Bookmark and Share
RSS

Recent Posts

  • RBAC and SUDO on AIX
    05/05/2017
  • Getting Back to RBAC
    04/11/2017
  • AIX and NTP
    02/16/2017
  • “Hard to be Current” with OSS
    01/26/2017
  • Using Internet Key Exchange Today
    12/14/2016
  • What Good Are Intentions?

    Time just keeps slipping by. This feels like a New Years best-intention gone bad. Three times before I have started a SecuringAIX blog and three times I have not finished.

    So today must be different. I must finish this blog entry – anything will be better than nothing.

    Read More

    Posted: June 10, 2014 |

    What Does It Take for Security to Get Management Attention?

    What does it take to get management's attention, to get the higher ups to be serious about getting something done with securing systems?

    I really enjoy discussing and implementing systems security.

    Read More

    Posted: December 17, 2013 |

    Are You Being Naughty?

    I have an AIX server—on the Internet—and I have been naughty! Shame on me!

    My intent is that this server  is  “open” just enough so "random" activity looking for servers to breach does not take it down. I say "random" because I doubt my ISP would be happy if I were the target of directed or sustained attacks. So, I try not to be too inviting.

    Read More

    Posted: October 14, 2013 |

    Improve Your Password-Hashing Algorithms

    Recently, I was at a customer site where I heard a conversation between an AIX admin and a Linux admin who were discussing their concerns regarding password-hash compatibility with Linux, active directory (AD) lightweight directory access protocol (LDAP) passwords and AIX.

    Read More

    Posted: September 23, 2013 |

    Exploring OpenLDAP for AIX

    Too much work and then vacations have delayed this post, leaving me feeling guilty when there’s really nothing to feel guilty about. I guess, somewhere inside me, there’s a desire to have some element of "BLING" whenever I write something for SecuringAIX. But there’s no need. I am not a professional writer or journalist, and blogs aren’t meant to always BLING.

    Read More

    Posted: July 22, 2013 |

    Implementing LDAP on AIX Offers a Few Surprises

    Read More

    Posted: June 03, 2013 |

    Good Grief—What Can Be Done About Identity Theft at the *NIX Level?

    Read More

    Posted: April 08, 2013 |

    AIX Hardening 101

    Read More

    Posted: March 04, 2013 |

    Combining audit and syslog

    Read More

    Posted: February 04, 2013 |

    Are You Compliant, in Control, or Neither?

    Read More

    Posted: December 18, 2012 |

    Displaying results 21-30 (of 37)
     |<  <  1 - 2 - 3 - 4  >  >|