Michael AM Felt

Michael AM Felt

Bookmark and Share

Recent Posts

  • Sweet32 Birthday! Your First Thoughts?
  • Security Isn’t Just Technology
  • What OpenSSH Are You Using?
  • RBAC and SUDO on AIX
  • Getting Back to RBAC
  • Still Breathing

    Still breathing... This year has been - different - for me. Generally speaking, my trips to customers are about 25% security related, and the rest is performance related. This year has been too light as far as security is concerned. 

    Read More

    Posted: December 04, 2014 |

    Use Dual-Key Authentication for Special Accounts

    A question about the risk of being able to login as root either remotely or limited to the (virtual) console came up on a discussion group in LinkedIn recently. Ideally, there is no need to ever login as root (the big question or risk being: who is root today). Instead, users should be logging as as themselves and then using a mechanism to switchuser (su, sudo, super, etc.) to root.

    Read More

    Posted: October 20, 2014 |

    My Role-Based Security Questions for You

    This year has been difficult for me to be "security minded." Besides security, I also do performance trouble-shooting and consultancy and this year that has kept me very busy. So, I do not feel like I have anything "new and improved" to share with you about how to improve the AIX security layer.

    Read More

    Posted: July 14, 2014 |

    What Good Are Intentions?

    Time just keeps slipping by. This feels like a New Years best-intention gone bad. Three times before I have started a SecuringAIX blog and three times I have not finished.

    So today must be different. I must finish this blog entry – anything will be better than nothing.

    Read More

    Posted: June 10, 2014 |

    What Does It Take for Security to Get Management Attention?

    What does it take to get management's attention, to get the higher ups to be serious about getting something done with securing systems?

    I really enjoy discussing and implementing systems security.

    Read More

    Posted: December 17, 2013 |

    Are You Being Naughty?

    I have an AIX server—on the Internet—and I have been naughty! Shame on me!

    My intent is that this server  is  “open” just enough so "random" activity looking for servers to breach does not take it down. I say "random" because I doubt my ISP would be happy if I were the target of directed or sustained attacks. So, I try not to be too inviting.

    Read More

    Posted: October 14, 2013 |

    Improve Your Password-Hashing Algorithms

    Recently, I was at a customer site where I heard a conversation between an AIX admin and a Linux admin who were discussing their concerns regarding password-hash compatibility with Linux, active directory (AD) lightweight directory access protocol (LDAP) passwords and AIX.

    Read More

    Posted: September 23, 2013 |

    Exploring OpenLDAP for AIX

    Too much work and then vacations have delayed this post, leaving me feeling guilty when there’s really nothing to feel guilty about. I guess, somewhere inside me, there’s a desire to have some element of "BLING" whenever I write something for SecuringAIX. But there’s no need. I am not a professional writer or journalist, and blogs aren’t meant to always BLING.

    Read More

    Posted: July 22, 2013 |

    Implementing LDAP on AIX Offers a Few Surprises

    Read More

    Posted: June 03, 2013 |

    Good Grief—What Can Be Done About Identity Theft at the *NIX Level?

    Read More

    Posted: April 08, 2013 |

    Displaying results 21-30 (of 40)
     |<  <  1 - 2 - 3 - 4  >  >|