Rlogin possible security problems

Assignment Help Basic Computer Science
Reference no: EM131288940

Rlogin is a software utility for Unix-like computer operating systems that allows users to log in on another host via a network, communicating via TCP port 513. Rlogin is most commonly deployed on corporate or academic networks, where user account information is shared between all the Unix machines on the network (often using NIS). But rlogin does have serious security problems. Please list rlogin's possible security problems.

Use the vulnerability database available on www.securityfocus.com/vulnerabilities to research three common vulnerabilities associated with the rlogin application. Next, write at least a two page paper in current APA format that lists each of vulnerabilities you discovered, how they affect the targeted systems, actions that can be taken to secure the systems, and provide information on an alternate application that can be used instead of rhost, if one is available.

Reference no: EM131288940

Questions Cloud

Calculate the impact on annual profits : FINA636I - Multinational Financial Management - Calculate the impact on annual profits (in OMR) of the new proposal under each scenario ( You may make additional assumptions if necessary, but these should be clearly stated)
What does the financing decision of a firm involve : What does the financing decision of a firm involve? List the general steps in the risk management of a company ? What is enterprise risk management? List the five activities of an investment manager.
Stakeholders for the project and list : 1. Identify at least 10 stakeholders for the project and list them as high, medium, and low based on their power and interest 2. Create a high level Work Breakdown Structure (WBS) showing major tasks associated with the project. Please use the stan..
Describe the two reproductive disorders you selected : a description of the two reproductive disorders you selected, including their similarities and differences. Then explain how the factor you selected might impact the diagnosis of treatment for the reproductive disorders.
Rlogin possible security problems : Rlogin is most commonly deployed on corporate or academic networks, where user account information is shared between all the Unix machines on the network (often using NIS). But rlogin does have serious security problems. Please list rlogin's pos..
Discuss the key characteristics of a successful manager : Find an article discussing the key characteristics of a successful manager. Post a link to the article in the discussion thread and provide a 2-5 sentence summary.
Network implementation plan : Create a shell for your Key Assignment. As you begin to craft a Network Implementation Plan for your organization, your first assignment is to create the shell. Please use Word for this assignment. The following is the outline you should follow:
Discuss the steps you would take to manage a successful team : Discuss the steps you would take to manage a successful virtual team (be sure to discuss how you would choose a platform to use and guidelines for monitoring virtual team performance).
Talk about your recipe what makes it healthy : Introduce the selected vegetable (fennel), talk about its history/cultural importance if any.Talk about your recipe what makes it healthy and what can make it healthier.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  National institute of standards and technology

How can the National Institute of Standards and Technology (NIST), help your company create a "best practices" cybersecurity policy? Your discussion should touch upon both the positive and the negative aspects of a well-structured policy.

  What is done during redo

What is done during Analysis? (Be precise about the points at which Analysis begins and ends and describe the contents of any tables constructed in this phase.)

  Design and implement an adt that represents a triangle

These operations are the class's constructors. The ADT also should include operations that look at the values of the ADT's data; change the values of the ADT's data; compute the triangle's area; and determine whether the triangle is a right triang..

  Forcible overthrow of existing social and economic condition

Explain marx Karl's bourgeois/proletarian distinctions and why proletarian ends can be attained only by the forcible overthrow of existing social and economic conditions.

  Using digital forensic tools or encryption tools

Using digital forensic tools or encryption tools in the virtual lab to extract the text in the picture (10%) and answer the question (10%).

  Evaluate security testing software

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowle..

  What does the underlying heap contain

What does the underlying heap contain after the following sequence of pseudocode operations, assuming that pQueue is an initially empty priority queue?

  What other properties might be useful for network addresses

One property of addresses is that they are unique; if two nodes had the same address it would be impossible to distinguish between them.

  Determine the air temperature at the turbine exit

Determine the total exergy destruction associated with the Brayton cycle described in Prob. 9-107, assuming a source temperature of 1500 K and a sink temperature of 290 K. Also, determine the energy of the exhaust gases at the exit of the regenera..

  Question regarding the protecting personal data

Your customer is a community clinic that works with families with problems of family violence. It has three sites in the same city, including a shelter for battered women and children. The director wants a computerized record and appointment syste..

  How much storage will probe require if it is to gather data

The system has a clock that runs at 1GHz. During each cycle of the system clock, the status of these 5 registers how much storage will the probe require if it is to gather data for 2 seconds?

  What is the domain of the function

What is the domain of the function?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd