If it was a third-party encryption program that was downloaded from say webattack.com, and the directory was encrypted, then removing the software and the registry entries are not going to "unlock" the directory.
The only way is to restore from a backup that was made before the...
You can run from the CWS:
dsh lslpp -L | grep -i db2
and not have to log into each node. This will show if the DB2 software is installed. The db2as is the administrative server instance and the db2fenc1 and db2inst1 are standard instances which were created when the software was installed...
Probably had to charge more, if not for transportation costs, then it might have been due to traffic volume. Whereas the larger city may get a traffic count of say, 1000 vehicles a day, the smaller town may only get a count of say, 100 vehicles. This has a lesser chance of someone stopping, thus...
If you are on an SP system and the host responds, then you should be able to open an s1term (or spmon) to the node. The only way you wouldn't be able to login is that the tcp subsystem hasn't started (or you have paging problems, etc).
I would power off the node and then from the CWS I would...
Applications cause most of the security holes. But Windows is less secure as an OS than Unix, even without apps installed, because of things like internet explorer being integrated into Windows which has more holes than swiss cheese.
Windows is so bloated there is no way to audit each line of...
Looking at your original post, I didn't even realize you could add a user specifying loadable modules. However, it doesn't appear from you klist that your user was added to the authentication database. Try using the kerberos kadmin command to add a new user.
Does your client have the /etc/krb-srvtab, krb.conf and krb.realms files along with a /.k5login?
When you listed the klist where is the new principal you added?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.