Abstract

The chapter provides information on breaking into Open VMS and Linux. The zero-damage, professional method of breaking into a Linux or OpenVMS system is the only acceptable way to take over the system if one has a legitimate need to do so. Some legitimate reasons include a system administrator leaving the company with no transition to the new system administrator, or the system is compromised and one has to take control and reset/rebuild the security. The chapter provides a ten-step process for changing an OpenVMS or Linux password. There is no written code on handling personal data in the absence of an administrator, but there is an ethical code. There are many reasons to break into a system; in the tool bag for OpenVMS and Alpha, one should always have an OpenVMS boot of the latest version (7.3, 7.3-1) one can find and a RedHat Linux 7.2 or a 7.3 boot disk. These tools help in opening up the systems when one needs to.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call