|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T i
Length: 773 (0x305) Types: TextFile Names: »init_kuang«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦ed5edc051⟧ »./cops/1.02/cops.102.tar« └─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦db60b44f1⟧ »./cops/1.02/cops.102.tar.Z« └─⟦ed5edc051⟧ └─⟦this⟧ »cops/init_kuang«
# /* Copyright 1985 Robert W. Baldwin */ # /* Copyright 1986 Robert W. Baldwin */ ############################################### # Kuang: Rule based computer security checker. ############################################### CAT=/bin/cat ECHO=/bin/echo # # Initialization. # ./clearfiles # # First setup what we have access to. # The uids.k file must include the user 'OTHER' meaning the world access bits. # Add any other UIDs accessible to the attacker (e.g., ftp, daemon). # # Directly accessible user IDs. $CAT >uids.k <<END OTHER END # # Directly accessible group IDs. # This usually includes a group like 'users', which most users are in. # $CAT >gids.k <<END END # # Setup the primary goal(s). # $ECHO Setting up goal #>/dev/tty ./addto uids root DO ANYTHING