Michael AM Felt

Michael AM Felt

Bookmark and Share

Recent Posts

  • Determining Patching Responsibility
  • AIX, Security and the Basics
  • The Danger of SUID, and using FLRTVC to Identify Vulnerabilities
  • Revealing the Obvious in OpenSSL
  • Why I Stay Away From Using gcc (on AIX)
  • What Does It Take for Security to Get Management Attention?

    What does it take to get management's attention, to get the higher ups to be serious about getting something done with securing systems?

    I really enjoy discussing and implementing systems security.

    Read More

    Posted: December 17, 2013 |

    Are You Being Naughty?

    I have an AIX server—on the Internet—and I have been naughty! Shame on me!

    My intent is that this server  is  “open” just enough so "random" activity looking for servers to breach does not take it down. I say "random" because I doubt my ISP would be happy if I were the target of directed or sustained attacks. So, I try not to be too inviting.

    Read More

    Posted: October 14, 2013 |

    Improve Your Password-Hashing Algorithms

    Recently, I was at a customer site where I heard a conversation between an AIX admin and a Linux admin who were discussing their concerns regarding password-hash compatibility with Linux, active directory (AD) lightweight directory access protocol (LDAP) passwords and AIX.

    Read More

    Posted: September 23, 2013 |

    Exploring OpenLDAP for AIX

    Too much work and then vacations have delayed this post, leaving me feeling guilty when there’s really nothing to feel guilty about. I guess, somewhere inside me, there’s a desire to have some element of "BLING" whenever I write something for SecuringAIX. But there’s no need. I am not a professional writer or journalist, and blogs aren’t meant to always BLING.

    Read More

    Posted: July 22, 2013 |

    Implementing LDAP on AIX Offers a Few Surprises

    Read More

    Posted: June 03, 2013 |

    Good Grief—What Can Be Done About Identity Theft at the *NIX Level?

    Read More

    Posted: April 08, 2013 |

    AIX Hardening 101

    Read More

    Posted: March 04, 2013 |

    Combining audit and syslog

    Read More

    Posted: February 04, 2013 |

    Are You Compliant, in Control, or Neither?

    Read More

    Posted: December 18, 2012 |

    Using RBAC With Scripts

    Read More

    Posted: November 26, 2012 |

    Displaying results 31-40 (of 46)
     |<  <  1 - 2 - 3 - 4 - 5  >  >|