Michael AM Felt

Michael AM Felt

Bookmark and Share

Recent Posts

  • Back to Basics: aixpert
    May 2, 2018
  • Determining Patching Responsibility
    March 22, 2018
  • AIX, Security and the Basics
    February 27, 2018
  • The Danger of SUID, and using FLRTVC to Identify Vulnerabilities
    February 8, 2018
  • Revealing the Obvious in OpenSSL
    January 2, 2018
  • What Good Are Intentions?

    Time just keeps slipping by. This feels like a New Years best-intention gone bad. Three times before I have started a SecuringAIX blog and three times I have not finished.

    So today must be different. I must finish this blog entry – anything will be better than nothing.

    Read More

    Posted: June 10, 2014 |

    What Does It Take for Security to Get Management Attention?

    What does it take to get management's attention, to get the higher ups to be serious about getting something done with securing systems?

    I really enjoy discussing and implementing systems security.

    Read More

    Posted: December 17, 2013 |

    Are You Being Naughty?

    I have an AIX server—on the Internet—and I have been naughty! Shame on me!

    My intent is that this server  is  “open” just enough so "random" activity looking for servers to breach does not take it down. I say "random" because I doubt my ISP would be happy if I were the target of directed or sustained attacks. So, I try not to be too inviting.

    Read More

    Posted: October 14, 2013 |

    Improve Your Password-Hashing Algorithms

    Recently, I was at a customer site where I heard a conversation between an AIX admin and a Linux admin who were discussing their concerns regarding password-hash compatibility with Linux, active directory (AD) lightweight directory access protocol (LDAP) passwords and AIX.

    Read More

    Posted: September 23, 2013 |

    Exploring OpenLDAP for AIX

    Too much work and then vacations have delayed this post, leaving me feeling guilty when there’s really nothing to feel guilty about. I guess, somewhere inside me, there’s a desire to have some element of "BLING" whenever I write something for SecuringAIX. But there’s no need. I am not a professional writer or journalist, and blogs aren’t meant to always BLING.

    Read More

    Posted: July 22, 2013 |

    Implementing LDAP on AIX Offers a Few Surprises

    Read More

    Posted: June 3, 2013 |

    Good Grief—What Can Be Done About Identity Theft at the *NIX Level?

    Read More

    Posted: April 8, 2013 |

    AIX Hardening 101

    Read More

    Posted: March 4, 2013 |

    Combining audit and syslog

    Read More

    Posted: February 4, 2013 |

    Are You Compliant, in Control, or Neither?

    Read More

    Posted: December 18, 2012 |

    Displaying results 31-40 (of 47)
     |<  <  1 - 2 - 3 - 4 - 5  >  >|