![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.150129 |
Kategorie: | Policy |
Titel: | Linux: 'readonly TMOUT' in /etc/profile |
Zusammenfassung: | When invoked interactively with the --login option or when;invoked as sh, Bash reads the /etc/profile instructions. These usually set the shell variables PATH,;USER, MAIL, HOSTNAME and HISTSIZE.;;On some systems, the umask value is configured in /etc/profile, on other systems this file holds;pointers to other configuration files such as:;; - /etc/inputrc, the system-wide Readline initialization file where you can configure the command;line bell-style.;; - the /etc/profile.d directory, which contains files configuring system-wide behavior of specific;programs.;;All settings that you want to apply to all your users' environments should be in this file. |
Beschreibung: | Summary: When invoked interactively with the --login option or when invoked as sh, Bash reads the /etc/profile instructions. These usually set the shell variables PATH, USER, MAIL, HOSTNAME and HISTSIZE. On some systems, the umask value is configured in /etc/profile, on other systems this file holds pointers to other configuration files such as: - /etc/inputrc, the system-wide Readline initialization file where you can configure the command line bell-style. - the /etc/profile.d directory, which contains files configuring system-wide behavior of specific programs. All settings that you want to apply to all your users' environments should be in this file. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |