5.4.5 Installation Files
New Installation Files
Table 5-7
File
/opt/novell/ncl/bin/
delete_login_profiles
/opt/novell/ncl/bin/
login_cfg_pam
/opt/novell/ncl/bin/
login_ucfg_pam
5.5 Other Security Considerations
If root is compromised, all network access could also be compromised. For example, if a
malicious entity gets root access, it might be able to steal user credentials and authenticate to the
network with those credentials.
44
Novell Client 2.0 SP1 for Linux Administration Guide
New
Modified Description
X
Run from YaST to purge all profiles.
X
Inserts pam_ncl_autologin into PAM file.
X
Removes pam_ncl_autologin from PAM file.
Need help?
Do you have a question about the CLIENT FOR LINUX 2.0 SP1 - ADMINISTRATION and is the answer not in the manual?
Questions and answers