IBM Stumping for WebSphere on Windows

IT managers once maintained a semblance of control over what types of operating systems were run in the data center, but they may as well relinquish all hope of doing so in the future—if they haven't already. The modern data center, while sophisticated, is more frequently a mixed bag of platforms—and that bag includes Windows.

Multiple platforms in the data center complicate many things, not the least of which is what Web server software to use. IBM wants to make sure that people understand that a mixed platform environment does not rule out WebSphere.

"A lot of people have already bought into making use of Windows as a platform [in the data center]," says Rob High, chief architect of IBM's WebSphere platform. "And a lot of people are concerned about what that means to them strategically."

High maintains that WebSphere offers the best combination of security, performance, and scalability on Windows, while conceding that explicit support for applications and components built using the .NET framework is not planned. Instead, High says that WebSphere supports interoperability between the Microsoft platform and J2EE via Web services, a method that he says all vendors would agree is correct and sufficient.

Native experience with language but rather to look to XML as a canonical type system," he says. "We're not going to get into a situation like Microsoft has with VB and VB.NET where they changed the object model type system and caused a lot of developers who are familiar with the data concepts of their language to change. The language that they're offering is essentially not the same language as they had before."

Trading on Java's Security
High said the real value of WebSphere on Windows is superior security, scalability, and high availability.

High says when it comes to security, the main advantage of WebSphere is its use of Java. Both the Java language and the J2EE platform impart inherent security characteristics, he says. High cites byte code protection, validation, memory isolation, and built-in platform authorization as key advantages of the Java language.

"The second layer is the inherent security of the J2EE platform, which includes an authorization and protection policy. We've exploited the Java authentication and authorization service, the JAAS framework, to enable both credential-based authentication as well as pluggability for third-party providers as well as the Java crypto engine. To make sure that we've got nominally secure, good quality encryption algorithms being applied there with the option to plug in even stronger ones."

More simply put, WebSphere can ride the coattails of security advancements created across an entire industry.

High says not every patch that Windows administrators have had to apply can be blamed on specific problems within IIS, but it casts a shadow over Microsoft's adroitness in the security arena and "it certainly draws out the question of what is the fundamental theory of security on which Microsoft operates; to ensure that anything they can do [to be secure] really is secure."

Getting on the Grid


Clustering is the other feature to which High attributes a strategic advantage of WebSphere on Windows. Clustering, he says, "lends a great deal of horizontal capability so you can add capacity by adding machines into the cluster. We provide that kind of clustering capability in a heterogeneous environment—including Linux, Unix, Windows, and mainframe-based systems."

This way IT managers can move machines in and out of the data center without concern for what operating system it runs. And High says later IBM will roll out new technology that automates server resource allocation, moving workloads on and off of available machines in the cluster, regardless of OS. (Read our coverage of similar plans announced last week by Oracle.)

It's worth noting that some of the features IBM cites as major advantages of WebSphere—such as J2EE platform reliability—are not unique to WebSphere. And there's no way to know whether these features will be enough to lure customers away from competitors, but IBM believes that the growing requirement to support Windows 2003 and Windows 2008 in a mixed platform data center gives it a strategic advantage that it doesn't intend to squander.

WebSphere Application Server V7.0 What new for Security

WebSphere Application Server V7.0 shipped some exciding new features for Security. WebSphere delivered a rich set of feature in providing greater granularity management of security controls, offering new Audit and Complicate features, and enhanced secure Proxy to meet your business.

Our new WebSphere Security Domains provide greater granularity management of security controls by offers more flexibility in configuring security under centralized management. WebSphere Security Domains is designed to allow for a separation of WebSphere administrative security and your business application security. For example, Business applications can be configured to use your external LDAP registry while the WebSphere administration can use your Federated Repository’s file base registry containing internal user. Further granularity can be further expanded between business applications by allowing separate security configuration between business applications using new security configuration scoping to a cell, a cluster, or application server level. This new level of security granularity provides significant new flexibility in the security mechanism implemented across various application portfolios.

Our new WebSphere Security Auditing feature offer enhanced complicacy and auditing capabilities. The auditing capabilities allow tracks a number of security related events. For Example of administrative actions that can be logged include: security configuration changes, key and certificate management, and access control policy changes. Business applications can be audited to record a number of security events such as authentication or authorization attempts. This new security logging and auditing capability ensures accountability for administrative actions. In addition, we offer a temper proof audit file to prevent any tempering of recorded audit data. For z/OS customers, the generated Auditing data optionally intergrades with the z/OS System Management Facility leveraging by recording the WebSphere Auditing data as part of the Auditing Type 83 records.

Our WebSphere Secure Proxy has been become a lot easier and more. The WebSphere Secure proxy offers a new DMZ Hardened Proxy profile option. The DMZ Hardened Proxy improves security by minimizing the number of external ports opened, loading only signed JARs, and running as an unprivileged user when binding to well known ports. Both static and dynamic routes are supported by the DMZ Hardened Proxy.

We encourage you to visit our WebSphere Application Server’s Infocenter under What New for more information on these features as well as the many other exciding features we are offering for WebSphere Application Server V7. http://publib.boulder.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/com.ibm.websphere.nd.multiplatform.doc/info/ae/ae/welc_newsecurity.html

IBM delays Lotus Notes for iPhone, users "too hip and cool"

Remember that formal announcement of Lotus Notes Mail on the iPhone? Right, Apple's first big corporate iPhone push which the AP said would happen at LotusSphere? Not going to happen, at least not yet. An IBM spokesperson told ZDNet Australia, "It's not something that (is) ready to go out and market or launch." In other words, Jobs heard about IBM's plan to steal his February SDK-launch thunder and shut down the announcement right quick. The most absurd part of all this has to be an enterprise adoption comment made by the so-called analyst, Kevin McIsaac, at IBRS (I be arse?). He said, "I can't really imagine someone who's really hip and cool -- like an iPhone user -- wanting to use Lotus Notes." Since when do the personal desires of users and corporate IT policy have anything in common Kev?

Lotus Domino eMail on your Apple iPhone

Lotus Domino Web Access

Lotus Domino eMail on your Apple iPhone animated banner.

IBM Lotus iNotes 'Ultralite' technology

Bring IBM® Lotus® Domino® email, calendar, and contacts to your Apple iPhone today! Now available as IBM Lotus iNotes™ software provided in IBM Lotus Domino Web Access 8.0.2, Lotus Domino data combines with the flexibility and connectivity of the Apple iPhone. Built on the time tested Lotus Domino Web Access infrastructure, users can quickly access email,

calendars, and contacts directly through the Apple iPhone Safari browser.

1. Access email, calendars, and contacts

2. Read email with details either hidden or shown

3. View email attachments

4. View details on meetings, all day events, reminders, and anniversaries5

5. View information on contacts and groups

6. Easily view your inbox

7. Quickly compose or reply to email

8. View day-at-a-glance calendar

9. View an organized view of your contacts

10. Quickly create new contact entries


















































Product Catalog For Notes/Domino

I often share this information with partners, customers, IBM sales teams, on forums, etc. It seemed like the next logical step was for me to make it public here on my blog. I want to be clear, I am not ranking, endorsing, or reviewing the products, I am simply listing them in alphabetical order (by company name) for your convenience. If you know of a product that is missing, please let me know so I can update the list.

I have created similar lists for Lotus Notes/Domino Administration Tools and Application Development products.

Also visit the Lotus Domino Catalog on IBM.com, the Global Solutions Directory Catalog and Business Partner Application Showcase on IBM PartnerWorld, and the OpenNTF Product Catalog Wiki.

Last updated July 20, 2006

Asset Management

  • Basic Business Systems Ltd. - IT Asset Management: Facilitates strategic decision making as it contains data about all your business assets, where they reside, how well the assets are working, the cost of each asset and how they are supporting the business.
  • Decision Labs Inc - Inspector: Software and Asset Management: Automatically scan the end user machines to collect software and hardware information and deposit in a Domino based management system.
  • DYSANT- Asset Manager: Gives you the tools to track and manage your hardware and software assets throughout their life cycle, and gives you critical information about all assets in your infrastructure.
  • Eden - Asset Manager: Gives you the tools to track and manage your hardware and software assets throughout their life cycle, and gives you critical information about all assets in your infrastructure.
  • RPR Wyatt - Essential Audit: Will inventory every client workstation and server in your enterprise via a simple Notes email with flexible exception reporting. Retrieve a list of all installed software as well as over 50 individual pieces of information. Essential Audit also reports on bandwidth consuming files such as mp3, jpg, and avi.

Calendar Tools

Customer Relationship Management (CRM) and Sales Force Automation (SFA)

Desktop Search
(which include Notes content)
Expenses / Billing / Invoices / Procurement

Facsimile (FAX)

HelpDesk /Customer Service / Problem Reporting

Hosting
  • Connectria - We implement highly customized Lotus Hosting Solutions at very competitive prices by using a sophisticated Lotus administration and monitoring environment. This enables us to deliver extremely high service levels at very attractive prices.
  • coreFusion is a Hosting Solutions Provider specializing in Messaging and Collaboration technologies. coreFusion offers a variety of web hosting options including your choice of Operating System, Web Engine, Statistics and Reporting and Hardware.

Human Resources
Install/Upgrade/Migration/Coexistence
  • AedifiComm - WorkplaceControl for Notes
  • Atlantic Decisions - ValuePrimer: A unique preparation and planning solution for ND6 upgraders. Provides a roadmap to accelerate the process of migration, reduce the risk of adversely impacting the core applications and improve the TCO of a Notes/Domino infrastructure.
  • Binary Tree - Common Migration Tool for Notes
  • Binary Tree - Desktop Update Tool
  • Cool Stuff for Lotus Notes - Migration Pro
  • Genii Software - CoexLinks and CoexEdit
  • ICODEX Software AG - INTEGRATE!People
  • SoftQuest Corporation - Install Pump
  • Wolcott Systems Group - Automated Deployment Toolkit
  • RPR Wyatt - Migration Pro: A Notes database that helps organizations plan for and execute their migration to Notes & Domino 6. It’s a unique and powerful collection of processes, procedures, checklists, databases and ‘best practices’ designed to help your organization have the fastest and lowest cost migration possible.
  • Trust Factory - Desktop Migration for IBM Lotus Notes (DMT): Solves a number of management problems caused by migration or consolidation, and for the most part, fully automated. Ex: old Database icons, Location documents, Environment variables in the notes.ini.
  • Trust Factory - Source code Migration for IBM Lotus Domino (SMT): Toolkit for the automatic detection of potential problems in design elements, and for solving them if necessary.

Learning/Education (for Users, Developers, and Administrators)

Portal Solutions
(Domino based)
  • BlueStorm Technologies - Portal Server for Domino: Java Portal framework designed specifically for the Domino Application Server.
  • i-seven - iPortal: Lotus Notes based Welcome page/database, and is used to provide the end-users with a common interface to all Notes databases in the company.
  • IT Factory - I*Portal: Includes a variety of intuitive and highly customizable Notes and Web Portal that offer a single point of entry, which brings the users together and allows them to act quickly on the most important electronic resources.
  • LavaTech - Domino Web Portal: A Lotus Notes based suite of databases which allows an organization to create a portal website and add new content using simple Lotus Notes documents.
  • PSC Group - enTouch.portal: You know the information you need is out there, somewhere. If only you could find it – quickly and easily. What you need is a portal – an uncomplicated, single point of access that can take you where you have to go and when you have to go in order to better run your business.
  • PAVONE - Portal and GroupPortal
  • You@Web


Project Management:

Reporting, Printing, Analysis, Data Mining, MS Office Integration

Search Tools:
  • Northern Collaborative Technologies - NCT Search: is an easy to use tool that adds muti-database search to your Domino based applications on the web, or in the Notes client.
  • Northern Collaborative Technologies - NCT Compliance Search: Designed to help you meet regulatory or legal requirements. Along with an indexed, printable collection of results, provides a log file which indicates among other things each database searched, the status of its full text index, the index update frequency, and the access level under which the search is granted.
  • IONET Ltd - FT Search Manager: A low cost tool that allows you to simultaneously search multiple Notes databases using Full Text search functions. Clients can search up to 50 Notes databases at the same time, with search results appearing at the client as they arrive. At any time the client can access search results while other results arrive in the background - no hourglass holds up the client.
  • IONET Ltd - Search Manager: Self-contained, web-enabled search tool that uses your Domain Index as the source, but provides greater functionality and cleaner results. You can decide which results come first, remove certain results, search within results, search subsets of information across databases, use enhanced categorisation etc.

Security
  • Extracomm Inc - SecurTrac: A Domino native add-on module that enhances the security of Domino applications and e-mail systems. SecurTrac is designed to provide detailed audit tracking throughout the life-cycle of electronic document activities or e-mail, and also provide intrusion alerts notifying system administrators of detected hacking.
  • Extracomm Inc - SecurEsign: Will enable companies to use electronic signatures for: Increased security and authentication reinforcement for sensitive and valuable company assets, Enabling compliance for regulated industries, Workflow sign-off, Paperless office document signatures, Database application signatures – adding, modifying, updating of records.
  • PistolStar - Password Power Authentication Plug-In for Lotus Notes/Domino
  • TIMETOACT Software & Consulting - SecureDomino: Secures Domino-servers in the Intra-, Extra ,and Internet and enhances the Domino-server functionality.


Social Software
  • Elguji - IdeaJam: Idea Management that helps companies understand which ideas are worth pursuing and which ones are not, and most importantly why.
  • Elguji - LinkJam: A social bookmarking tool that allows teams to save, share and organize their bookmarks.

Domino System Administration Products/Tools

Below is a list (certainly incomplete) of Lotus Notes/Domino Administration tools. As well as figuring out what categories I should break them down into for easier searching. This list currently does not include email management, anti-virus, nor backup/restore products, I'll be posting them soon, but I wanted to get the information below out in the mean time.

Make sure to see the Lotus Domino Catalog on IBM.com, and the Global Solutions Directory Catalog and Business Partner Application Showcase on IBM PartnerWorld.
Axceler - ServerAdmin Plus: Easily address critical administrative challenges including Security, User and Group Management, Mail File and Database Management, and Server and Client Management. Provides comprehensive analysis that can be used to identify and immediately act on problems in your environment.

Lotus Notes/Domino Administration Tools:
*not including email management, backup/restore, anti-virus, etc.


AedifiComm - WorkplaceControl: Lets Notes administrators centrally manage, upgrade, migrate, and control the user environment.

Asia/Pacific Computer Services - NotesTracker: a universal enabler for profiling the usage of any of your IBM Lotus Notes databases, in a common way across both Notes and Web environments and with a common, easily-understood reporting mechanism. Track usage in real time and understand how your applications are being used -- for compliance, control and all sorts of other purposes.

Atlantic Decisions - Active User Monitor: Whether you are upgrading to Domino 6 and want to cleanup your address book before upgrading or are just tired of paying for unused licenses this application can help identify inactive users.

Atlantic Decisions - Angkor: Control the costs of administration and application maintenance of your Lotus Notes infrastructure. Determine the high value applications and who is using them. Manage storage requirements and consolidate servers. Identify the mission critical applicafions for ND6 or Websphere upgrades.

Atlantic Decisions - Password Management Utility: Allows administrators to centrally manage users passwords for Domino and Websphere servers.

BinaryTree - CMT for Notes Domains, Servers, Users, and Desktops: Designed to dramatically reduce the effort and expense usually associated with the process of migrating, consolidating, or separating Lotus Notes Domains.

Botstation - Larm-O-Matic: Provides Domino administrators and developers with easy configurable tool to monitor important Domino functions.

CHC-3 Consulting - DB Mover - A tool for moving databases from an old server onto a new, replacement server

CooperTeam - ACLManager: Designed as an active part of your company’s security policy for accessing information, ACLManager manages the access rights to your various applications. ACLManager is able to continuously monitor your databases in order to secure and maintain your initial access rights.

CooperTeam - DeskTop Manager: Provides a complete remote administration of your companywide Lotus Notes clients. All aspects of Client administration and maintenance can be defined and managed centrally.

CooperTeam - InfoNSF: Precise information, for a complete understanding of your Notes environment. Database information is presented in an easy overview that can be interpreted by the Administrator or Developer. The build-in alert view can be used to automate daily tasks in managing your Notes databases. Auditing all Notes Databases in a flash for consolidation and migration projects is now possible.

dotNSF - LTPA Renewal: Allows users to renew their LTPA tokens automatically as they work and demonstrate they are still actively using the system.

dotNSF - Single Sign On for IIS: A secure and robust way to extend SSO from LTPA IBM servers such as Domino, WebSphere, Lotus Document Manager (Domino.Doc), Lotus Instant Messaging and Web Conferencing (Sametime) - to Microsoft IIS.

DYS - CONTROL! Enterprise Edition: IT organizations can efficiently collect, analyze, report and alert on enterprise wide activity all the way down to a server, user, database or even network link. Four CONTROL! application management suites are available: Email CONTROL!, Replication CONTROL!, Application CONTROL!, and Collaboration CONTROL!.

DYS - CONTROL! Standard Edition: A suite of products for the Small to Medium sized business (under 3,000 seats) that helps significantly reduce Domino messaging and database costs and improve service level performance by providing comprehensive usage analyses and alerts on your Domino infrastructure.

DYSANT - AuditLog: Used to monitor the changes occurring in the databases structures, resulting from business processes implementation.

GSX - Automated Lotus Notes ID & Directory Management

GSX - Automated Maintenance: Automate the maintenance procedures you are now performing manually and automatically ensure that your servers are always running with maximum amount of available resources.

GSX - Domino Server Monitoring and Statistics Reporting: Gives you a global view showing the real-time status of your entire server network. At a glance, provides you with key status information so you don't have to dig through endless screens just to see if your servers are healthy.

GSX - File Manager: Allows you to centrally manage the installation and deletion of Notes databases and other files on Domino servers.

HADSL - Federated Identity & Resource Manager (FirM): Allows you to federate user management down to business users in your organisation, increasing service level, increasing control and improving environmental consistency.

HELP Software - Agent Auditor produces a detailed agent inventory for selected databases, reports potential problems and calculates the scheduled agent load for a server. Agent Auditor requires Notes/Domino 6.x.

HELP Software - Database Activity identifies unused databases and much more. Database Activity consists of four separate utilities (Activity Summaries, Activity Alarms, Activity Details, and Mail File Activity) to monitor and analyze user activity logs.

HELP Software - Desktop Manager: When you change a server name or decommission a server in your organization, end users are left with database icons and bookmarks that point to an old server and / or database path. In addition, some settings in location documents, connection documents and the NOTES.INI file may contain incorrect values. Desktop Manager automates the process of updating all of these quickly and easily.

HELP Software - GroupFlow: automates group management. Adds workflow to the tasks of creating and deleting groups, adding and removing group members, changing group owners, changing group names and more. With GroupFlow you can get out of the group management business and hand off group management related tasks to group owners.

HELP Software - History: Find out who's using their Notes license and who isn't. Why pay for licenses that aren't being used? Also tracks the version and license type for each user.

HELP Software - ID Manager automates Notes ID creation, distribution, recertification, name changes and termination. With ID Manager, much of the ID creation process can be given to the help desk or other non-administrators without giving them access to your certifier IDs.

HELP Software - Power Tools: 63 administrative tools for Notes / Domino to help you monitor and manage ACLs, agents, attachments, database properties, dead mail, groups, large mail files (and large attachments), LOG.NSF, mail files, orphan documents, reader and author names fields, replication, replication or save conflict documents, SMTP work queues, templates, and more.

IBM Tivoli - IntelliWatch Pinnacle for Distributed Systems: A comprehensive systems management solution for Lotus Domino, offers a wide range of features including: automated problem detection and correction, system-wide product configuration options, custom statistics and reporting capabilities, and fault recovery.

IBM Tivoli - Monitoring for Messaging and Collaboration for Lotus Domino Servers: Ensures the availability and optimal performance of Lotus Domino server environments.

ICODEX Software - INTEGRATE!People: Empowers Notes / Domino environments with comprehensive central desktop, bookmark and replicator page management, desktop roaming and –recovery, as well as portal content management features.

Infoware Solutions - Database Management Tool: For managing IBM Lotus Domino databases, standardize the ACL, the access groups and the attributes of files (nsf). Furthermore DMT decentralize the responsibility of the databases to specific database owners.

Infoware Solutions - Mailpak Archiving Tool: A disk saving tool for easily automating the process of archiving old IBM Lotus Domino mail messages.

Infoware Solutions - Mailpak Out of Office: A server task based tool providing centralized “Out of Office” integration with IBM Lotus Domino mail. Supports both IBM Lotus Domino Web Access and IBM Lotus Notes client

Infoware Solutions - Mailpak Quota Tool: Interacts with the standard IBM Lotus Domino mail database quota, Domino quota, and offers the possibility to get mail database statistics and send specific Mailpak QT messages to users, centralizes and automates the quota maintenance and supports automatic quota management on replicas as well.

Infoware Solutions - PDA Management Tool: For enhancing administration of a OneBrigde Mobile Groupware Server for IBM Lotus Domino. The product addresses the following issues: user management, billing, authentication, deployment of new users, ease of administration, delegation of administration to groups in your organization, software distribution and individual application installation.

Infoware Solutions - User Management Tool: Makes it possible to perform user administration in an easy, conformed, time saving and secure manner.

IONET - Change Manager for Domino: Provides change management and audit trail reporting for Domino Server R6+ configuration and security settings, as well as allowing the comparison of configurations and validation of Directory contents.

IVE Technologies - ACL Dominator: A platform-independent ACL Management Security Tool allowing Access Control Lists to be quickly and easily managed across all databases on a Lotus Domino network.

IVE Technologies - AttachZIP: An attachment compression and archive solution for Lotus Notes which significantly reduces database sizes on Lotus Domino servers.

Lotus Sandbox - Mean Time Between Failure: Domino server add-in that calculates several Domino server uptime statistics.

MartinScott Consulting - NoteMan: Dozens of integrated Notes utilities for everyday development, testing, and administration tasks that would otherwise be manually tedious and costly.

Nash!Com - Domino on Unix/Linux Start Script: The start script is designed to be one stop shopping for all kind of operations done on the Unix prompt. The script can start and stop the server, provides an interactive console and run NSD in different flavors. The script ensures that the environment is always setup correct and supports multiple partitions.

OpenNTF - ACLHelp: A server task for Lotus Domino that allows a database ACL to be modified or inspected from the console - useful if the administrator has lost access to the database.

OpenNTF - File Manager For Lotus Notes: Generates a list of NSF/NTF files from either local machine or a server. Provides server different reports, and allows you to compare the files from two servers (useful for clustering, consolidations, etc.)

OpenNTF - Surely Template: Tool for managing replica IDs of server templates.

OpenNTF - User Administration Utility - Provides a means by which users can manage their own ID both efficiently and securely via a web browser.

PistolStar - Password Power Authentication Plug-In for Lotus Domino: End-users can consolidate and simplify management of end-user accounts and credentials by authenticating against their LDAP directory to access all Domino Web sessions,

PistolStar - Password Power Authentication Plug-In for Lotus Notes: Enables clients to access Lotus Notes applications through authentication against LDAP directories. Allows organizations to end the time-intensive password maintenance and recovery tasks for the Notes ID.

RPR Systems - ANTRID: A Notes Tool for Replica IDs". This tool allows Lotus Notes Administrators to change the Replica ID of Lotus Notes databases.

RPR Wyatt - Agent Master: collects detailed agent information on configuration settings and execution specifics, provides notification of key agent failures, and allows management control of end-user created agents.

RPR Wyatt - Essential Tools: Collects comprehensive user, ACL, and database information in a single central location. Find your security holes at a glance and correct them globally, with a document audit trail.

Sherpa Software - Database Attender: Database management tool designed to monitor and control database security, usage, content and deployment. By providing a single, centralized place to oversee the notes infrastructure, Database Attender streamlines the administration process, thereby reducing the total cost of ownership.

Sherpa Software - Directory Attender: A platform independent Lotus Notes utility that gives administrators the ability to manage data within their Domino directories. This management is automatically carried out by Directory Attender's enforcement of restrictions that are created by the Lotus Notes administrator. These restrictions manage directories in one of three ways: access control lists, contents and documents.

Sherpa Software - Discovery Attender: Search and discovery tool that automates investigative tasks in Domino server databases. With this tool, administrators can immediately gain access to content and efficiently search, locate and review electronic information.

Shireburn Software - Integra for Domino Administrators: Integra for Domino Administrators provides reports from the most important databases covering ACL settings, traffic and usage, resource utilization and configuration analysis.

Stampede Technologies - TurboGold Enterprise Edition: Provides significant performance improvements in four solution areas: data movement, data storage, data control, and web acceleration. and advanced user administration. Also provides services for setting policies for replication and synchronization, Web acceleration, multicasting, and database priority assignments.

Teamstudio - Teamstudio for Administrators: Modular suite of server tools to maintain database integrity, manage agents, identify and resolve save or replication conflicts, identify and update broken doc links, and make data maintenance more manageable overall.

Trust Factory - Domino Network Analysis (DNA): provides you with a comprehensive and comprehensible management overview of your total Domino infrastructure, helping you make well-founded technical and strategic decisions on consolidation, management and budget issues based on unambiguous and objective information.
webWise Network Consultants - Make ACL: Super-powerful Domino ACL management from the server console

Workflo Systems Inc - Workflo!ACLManager: Allows administrators to see and modify the Access Control Lists of every Notes database on a server or workstation. Instead of having to open every database one at a time and make changes to the ACL, you can see which users have access to what databases

Workflo Systems Inc - Workflo!Log Analyzer: Translate the information in the Domino Web Server Log into meaningful, readable information. Using the Workflo!Log Analyzer, you can track everything from individual user sessions to monthly statistics. See what pages were hit, in what sequence, how long users stayed, and where they came from. Daily Statistical summaries contain 15 pages of summaries and charts, all viewable from Notes or a browser.

Ytria - aclEZ - Do you need to see and mass modify all the ACLs on a server? With aclEZ, Domino administrators can quickly see and categorize ACLs on a server, analyze them for consistency and close security loopholes in an instant. You can also navigate and expand ACL groups to quickly see exactly who's inside them allowing you to fix problems right away. A time-saving tool a for Domino administration.

Ytria - agentEZ - Domino administrators can use agentEZ to instantly categorize, analyze and verify agent logs, properties and signatures. By using agentEZ, you can quickly and easily see the underlying causes for any agent problems—sparing you from the tedium and headaches that so often come with manually tracking down these problems. A time-saving tool a for Domino administration.

Ytria - scanEZ: Lotus Notes/Domino Database Explorer, allowing Notes professionals to find problems inside any database and to fix them instantly. With smart utilities to find/edit/correct any document, profile, deletion stub, solve conflicts and see replication details.

Ytria - signEZ: Need to give your developers the ability to sign design elements with a signing id? And not give physical access to the id? Sign all design elements, and securely delegate the signature of a database with signEZ.

Socialtext Widget Wednesday - How about some Lotus Widgets?

Announcing Socialtext Launches Widget Wednesday: a Distributed Hackathon for Widgets & Mashups

- Wednesday on November 12, a distributed hackathon for widgets and mashups. Socialtext partners Box.net, Denodo, Newsgator, Meebo, Six Apart, Slideshare and others will participate in the hackathon to develop OpenSocial standard-based widgets and mashups on the Socialtext platform.

- Socialtext also announced that it will release all of the widgets it develops under an Open Source license -- to help partners, customers and developer community members create mashups leveraging Socialtext's best-in-class REST API.

That second part really excites me! I can't count how many times I demoed some really cool plugin for Notes or Sametime which was developed inside IBM, but then was not allowed to share it with partners or customers due to the IBM lawyers!

Now of course I'd love to see Lotus widgets for Socialtext. Perhaps an iNotes Ultralight widget, a Domino view widget, a Sametime buddy widget, Connections widgets, etc. We support the OpenSocial standard, so perhaps some awesome Lotus developer could crank out a few OpenSocial Lotus widgets! Get coding!
Image:Socialtext Widget Wednesday - How about some Lotus Widgets?
Socialtext Dashboard.

Instalasi Samba pada Ubuntu

1. Pengenalan
SMB (Server Message Block), adalah protokol untuk sharing file dimana menggunakan nama komputer dan tipe numerik untuk membuat nama dari NetBIOS (Network Basic Input/Ouput System).

2. Instalasi Samba
Download paket samba dari http://www.samba.org, lalu compile dengan smbmount, tentukan dimana akan menyimpan manual direktori $MANPATH. Keadaan awal file smb.conf berada di /usr/local/samba/lib/
dan file password di /usr/local/samba/private/ .

$ cd samba-2.2.3a/source
$ ./configure –with-smbmount –mandir=/usr/man
$ make
# make install
$ cd ../..


3. Konfigurasi Samba

Beberapa bagian konfigurasi yang perlu di perhatikan,

log level = 1

file log diperlukan untuk memantau koneksi apa saja yang terjadi, juga bila terjadi gangguan dapat dengan mudah menganalisa. Para developer biasanya lebih suka menggunakan log level = 10.

log file = /var/adm/samba/service-%S.log
log file = /var/adm/samba/user-%u.log
log file = /var/adm/samba/machine-%m.log

interfaces = 192.168.0.0/16 127.0.0.1
bind interfaces only = Yes

Hal ini dilakukan agar samba hanya melayani dalam lingkup localnet saja, hal ini sangat mengurangi resiko keamanan jika host anda memiliki IP Public di internet.

encrypt passwords = Yes

Untuk klien yang menggunakan sistem operasi windows terlebih dahulu di setting lagi agar dapat menggunakan enkripsi password.

password level = 8
username level = 8

Nilai 8 untuk memastikan jika uppercase dan lowercase untuk username dan password tidak menjadi masalah.

log file = /var/log/samba/%m.log
debug level = 1

Simpan file log dalam direktori tertentu. Selalu jalankan debug pada level 1 jika anda ingin mengetahui apa yang sedang terjadi pada samba, level 3 diperlukan jika anda ingin mengetahui informasi yang lebih lengkap, dan level 10 diperlukan jika anda seorang developer samba. Variabel %m digunakan untuk nama komputer dari mesin klien.

time server = Yes

Sinkronisasi waktu untuk klien.

socket options = TCP_NODELAY IPTOS_LOWDELAY SO_KEEPALIVE SO_RCVBUF=4096 SO_SNDBUF=8192

Optimisasi soket. Buatlah suatu file misalnya “dd if=/dev/zero of=testfile count=1024 bs=1024″, kemudian disable program antivirus, restart samba, lalu ambil fie tersebut dan copy kan ke server, berapa lama waktu yang dibutuhkan (SO RCVBUF). Restart samba kemudian copy kembali file tersebut ke workstation, waktu yang dihasilkan merupakan (SO_SNDBUFF).

logon script = %G.bat
domain logons = Yes
os level = 40
lm announce = False
dns proxy = No
wins support = Yes
invalid users = root @wheel
hide unreadable = Yes
hide files = /example.txt/*.bad/
veto files = /*.exe/*.com/*.vbs/*.chm/riched20.dll/*.{*}/lost+found/
veto oplock files = /*.mdb/*.MDB/

[homes]
comment = “%S Home Directory”
username = %S
writable = yes
create mask = 0600
directory mask = 0700
only user = Yes
browseable = No

[sample]
path = /example/sample1
valid users = +usergroup
force group = +usergroup
writable = yes
create mask = 0660
directory mask = 0770

[netlogon]
path = /example/netlogon
admin users = sam
write list = sam

Konfigurasi Pelayan Linux UBUNTU sebagai Gateway dan Squid

Pada tutorial ini kita akan memulai konfigurasi ubuntu server yang telah terinstall dalam mesin anda sebagai gateway untuk internet dan dipadukan dengan squid sebagai transparasi proxy.

1. Dimisalkan ubuntu server telah terinstall dalam mesin anda. Kemudian silahkan login dengan user yang telah dibuat dalam proses penginstallan.
2. Setelah anda login dengan user yang dibuat, kita akan membuat password untuk user “root” atau administrator dengan mengetik perintah “sudo passwd root”, kemudian masukkan password untuk user yang kita buat tadi. Kemudian baru masukkan password untuk user root dari mesin anda
3. Jika password yang anda masukkan sama maka anda telah berhasil mengganti password root. Komentar jika password anda tepat adalah “password updated successfully”
4. Untuk mengecek apakah anda telah dapat login dengan user root ketik “exit” kemudian login lagi dengan user root dan masukkan password root yang telah dibuat. Tampilan jika telah berhasil login dengan user root.
5. Tahap selanjutnya adalah konfigurasi kartu jaringan ubuntu server yang akan digunakan sebagai router gateway. Sebelumnnya edit file konfigurasi jaringan dengan nama interfaces yang terdapat di dalam folder /etc/network.
Perintah : cd /etc/network
vim interfaces
6. Kemudian tambahkan konfigurasi ip untuk jaringan di ethernet yang ke lan atau eth1. Dalam kasus ini sesuai dengan desain jaringan sebelumnya ethernet yang ke LAN dengan “IP 192.168.20.1” dan ethernet yang ke INTERNET atau eth0 dengan “IP 172.19.99.21” dan default “gateway 172.19.99.254” Untuk mulai mengedit file interfaces tekan tombol “I” pada keyboard sehingga status berubah menjadi “INSERT” setelah selesai menambahkan konfigurasi tekan tombol “ESC”. Untuk menyimpan konfigurasi dan keluar dari ketik “:wq”.
7. Kemudian untuk menerapkan konfigurasi diatas kita restart konfigurasi jaringan dengan menggunakan perintah : /etc/init.d/networking restart
8. Cek perubahan konfigurasi IP dengan perintah : “ifconfig”.
9. Setelah itu tambahkan baris “net.ipv4.ip_forward = 1” di dalam file sysctl.conf baris terbawah yang terdapat dalam folder /etc/, dengan perintah “ vim /etc/sysctl.conf ”.
10. Setelah itu restart kembali konfigurasi jaringan dan coba ping ke alamat www.google.co.id
11. Setelah mesin ubuntu dapat terkoneksi dengan internet ketik perintah : apt-get update untuk mengupdate database repository yang diperlukan untuk instalasi software.
12. Setelah proses update, sekarang kita install software squid yang diperlukan untuk web-chace dan transparasi proxy dengan mengetik perintah : apt-get install squid.
13. Jika proses instalasi squid telah berhasil lanjutkan dengan menambahkan perintah iptablesnya melalui perintah : iptables –t nat –A PREROUTING –i eth1 –p tcp –dport 80 –j DNAT –to-destination 192.168.20.1:8080 iptables –t nat –A POSTROUTING –s 192.168.20.0/255.255.255.0 –j MASQUERADE
Maksud dari perintah pertama diatas adalah untuk mengalihkan seluruh paket yang menuju ke ethernet 1 dengan alamat port 80 untuk dialihkan ke port 8080 yang akan menjadi port service dari squid sehingga setiap paket dapat di monitoring. Sedangkan perintah kedua digunakan untuk “memasking” jaringan LAN yang terdapat dibawah router agar hanya ip publik router ubuntu saja yang dikenal di internet.
14. Kemudian Simpan Konfigurasi iptables dengan mengetik perintah : iptablessave > /etc/network/iptables
15. Agar konfigurasi selalu dapat berjalan saat mesin ubuntu server dihidupkan ulang atau booting tambahkan baris berikut :
“iptables-restore /etc/network/iptables” di dalam file rc.local yang terdapat pada folder /etc/init.d/
16. Kemudian restart service dengan menggunakan perintah “/etc/init.d/rc.local start”.
17. Langkah selanjutnya adalah konfigurasi squid. Caranya adalah dengan berpindah ke dalam folder /etc/squid dengan menggunakan perintah “cd /etc/squid”, kemudian edit file squid.conf dan sesuaikan konfigurasinya menjadi seperti dibawah ini :
http_port 8080 transparent acl QUERY urlpath_regex cgi-bin \?
#redirect_program /usr/bin/adzapper.wrapper
ipcache_size 2056
ipcache_low 90
ipcache_high 95
cache_mem 95 MB
maximum_object_size 10096 KB
maximum_object_size_in_memory 8 KB
cache_access_log /var/log/squid/access.log
cache_dir ufs /var/spool/squid 900 16 256
cache_log /var/log/squid/cache.log
cache_store_log /var/log/squid/store.log
#Recommended minimum configuration:
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443 # https
acl SSL_ports port 563 # snews
acl SSL_ports port 873 # rsync
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl Safe_ports port 631 # cups
acl Safe_ports port 873 # rsync
acl Safe_ports port 901 # SWAT
acl purge method PURGE
acl CONNECT method CONNECT
#Recommended minimum configuration:
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
#http_access deny to_localhost
#================konfigurasi client ================
acl bahaya url_regex "/etc/squid/blokir.txt"
http_access deny bahaya
acl client src 192.168.20.0/24
http_access allow client
#httpd_accel_port 80
#httpd_accel_host virtual
#httpd_accel_single_host off
#httpd_accel_with_proxy on
#httpd_accel_uses_host_header on
http_access allow localhost
http_reply_access allow all
visible_hostname server-smk1.or.id
cache_mgr admin@testing.or.id
forwarded_for on
ie_refresh on
18. Kemudian buat sebuah file didalam folder /etc/squid dengan nama blokir.txt.
19. Setelah mengedit file squid.conf simpan konfigurasi dan restart service squid dengan mengetik perintah : /etc/init.d/squid restart.
20. Setelah semua konfigurasi selesai, setting ip di client dengan menggunakan gateway dari ip lan ubuntu server, dimana ipnya adalah 192.168.20.1 kemudian lakukan tes ping ke alamat www.google.co.id
21. Jika berhasil silahkan coba browsing dari client, jika konfigurasi anda benar akan terbuka alamat yang anda tuju.

Optimasi Linux

Linux mewarisi keadaan unix. Itulah sebuah kfakta yang menjadi panduan seseorang memilih linux sebagai sistem operasi pada sebuah PC. Beberapa orang menyukai keadaan ini daripada kemudahan penggunaannya. Mereka berfikir dengan jaminan sekuriti yang tinggi kepada file-file peribadi. Unix identiti dengan kebaikannya. Tapi siapa sangka jika kita lalai saja, contohnya linux, jadi tidak di sangka linux pun mampu menembusi kebaikannya. Banyak webserver-webserver yang menggunakan sistem operasi Linux yang sering kali di jadikan sasaran deface. Baik dari salahnya konfigurasi Linux sebagai server atau bug yang terdapat dalam program web servernya. Untuk menangani dan memanfaatkan kebaikan dari unix di Linux ini, sepatutnya linux mempunyai beberapa penangan yang berasal dari sistem linux sendiri. Tanpa ada software tambahan jadi di bawah ini akan di beritahu bagaimana memanfaatkan kebaikan linux

A. LILO
LILO boot :


Langkah pertama ketika ingin mengoptimalkan linux ialah membuat secure lilo. Lilo sangat penting dan perlu dijalankan ketika secara default linux di set untuk memasukkan opsi ketika pertama boot. Keadaan ini tentu saja akan mengenakkan para cracker ketika waktu linux boot muncul
Secara default linux akan memberikan authorize kepada siapapun untuk login sebagai root. Caranya ketika menghadapi prompt seperti diatas ketikkan linux single. Yang artinya sistem akan di boot dengan Run Level 1 yaitu sebagai super user (root). Keadaan ini akan sangat berguna ketika super user sendiri lupa password root dan dapat login dengan cara diatas tanpa harus memasukkan password root. Tapi jika prompt diatas tetap ditampilkan jadi dengan mudah sistem mampu di acak-acak. Jadi terdapat berbagai macam tipe pengokan diantarnya :

1. Mendisable linux single.
Langkah pertama yaitu mendisable linux single yaitu tidak ada tipe boot dengan Run Level 1 atau linux single. Buka /etc/inittab, cari skrip di bawah ini id:3:initdefault: setelah itu tambahkan skrip dibawah ini tepat di bawahnya ~~:S:wait:/sbin/sulogin Penambahan tersebut akan meminta user yang login dengan linux single untuk memasukkan password root terlebih dahulu. Setelah menambah baris diatas jalankan perintah di bawah ini: # /sbin/init q
2. Mengubah konfigurasi lilo.conf
Buka file /etc/lilo.conf Pada redhat 6.2 lilo.conf nampak seperti dibawah ini:
boot=/dev/hda map=/boot/map install=/boot/boot.b prompt timeout=50 linear default=linux image=/boot/vmlinuz-2.2.14-5.0 label=linux read-only root=/dev/hda1
2. a Timeout
Lilo seperti diatas mempunyai timeout=50; artinya bahwa sistem akan menunggu inputan dari user selama 50 detik. Dengan waktu tunggu seperti ini kemungkinan untuk login dengan linux single sangat besar. Oleh kerana itu langkah sederhana menghilangkan waktu tunggu. Isikan timeout = 00.
b Passsword lilo
Selain memberikan waktu tunggu yang kecil lilo juga dapat di password. Dengan cara memberikan opsi restricted dan password.
Dibawah baris Default=linux ; tambahkan
restricted password=masukkan_passwordnya
Penambahan password diatas memberikan maksud bahwa walaupun tidak login sebagai linux single atau user yang lain lilo akan meminta password root. 2.c Menghilangkan prompt Ketika linux booting jadi muncul

LILO boot :

Kata tersebut muncul kerana pada file lilo.conf tertulis kata prompt. Untuk menghilangkan prompt agar tidak ada opsi booting hapus kata tersebut.
Jika sudah ditambahkan semuanya jadi lilo yang telah dimodifikasi seperti dibawah ini:
boot=/dev/hda map=/boot/map install=/boot/boot.b timeout=00 linear default=linux restricted password=masukkan_password image=/boot/vmlinuz-2.2.14-5.0 label=linux read-only root=/dev/hda1
Jika sudah dikonfigurasi seperti diatas keluar dari editor dan save. Untuk memberikan kepemilikan hanya kepada root jadi jalankan :
# chmod 600 /etc/lilo.conf
# /sbin/lilo.conf LILO version 21, Copyright 1992-1998 Werner Almesberger Reading boot sector from /dev/hda Merging with /boot/boot.b Boot image: /boot/vmlinuz-2.2.14-5.0
Added linux * /boot/boot.0300 exist – no backup copy made. Writing boot sector.


Konfigurasi diatas menggunakan redhat 6.2, untuk distro yang lain sama. Jika langkah diatas sudah dijalankan dengan betul jadi lilo dijamin ok. Namun ada satu hal yang penting ialah kepemilikan file /etc/lilo.conf. Tentu saja file tersebut dengan owner root. Tapi bagaimana jika suatu waktu root ceroboh atau salah konfigurasi lilo.conf jadi bis saja linux tidak mampu booting kerana konfigurasi lilo salah.Untuk mengatasi hal tersebut ada perintah di linux yang mengokkan file atau direktory sehingga hanya read-only saja termasuk root sendiri. # chattr +i /etc/lilo.conf Perintah diatas memberikan imunitas file lilo.conf untuk dapat di read-only saja oleh root. Jadi tidak mampu diedit atau dimodifikasi. Untuk menghilangkan imunitas file tersebut perintahnya :

# chattr –i /etc/lilo.conf

B. Disable ctrl+alt+del Seperti yang telah diketahui untuk shutdown di linux hotkey-nya ctrl+alt+del. Selain menggunakan hotkey juga dapat menggunakan printah /sbin/reboot, /sbin/halt. Tapi jika ingin linux ok perintah shutdown dengan keyboard harus didisable kerana mampu saja orang lain yang dengan tidak sengaja menekan ctrl+alt+del sedangkan Anda sedang mengkonfigurasi sistem tentu ini tidaklah mengenakkan dan langkah preventif ialah jawabannya. Buka file /etc/inittab
ca::ctrlaltdel:/sbin/shutdown -t3 -r now Pada baris diatas berikan tanda # di depan baris agar perintah diatas dianggap komentar oleh linux (# merupakan simbol komentar pada bahasa C).
#ca::ctrlaltdel:/sbin/shutdown -t3 -r now
keluar dari editor dan save jalankan perintah di bawah ini
# /sbin/init q
C. /etc/services File /etc/services berisi nomor port yang digunakan untuk koneksi dengan server atau dengan klien. File tersebut digunakan oleh klient untuk meresolv antara port dengan tipe service masing-masing port. Misal apabila klient atau server request smtp jadi akan melihat pada file /etc/services smtp menggunakan nomor port berapa. Oleh kerana sangat pentingnya jadi perlu diberi imunitas file.


# chattr +i /etc/services
D. /etc/securetty File /etc/securetty memberikan konfigurasi tty dan vc (virtual console) kepada root atau user yang lain. Jadi perlu di disable tty yang tidak digunakan. Buka file /etc/securetty
tty1
tty2
tty3
tty4
tty5
Jika konfigurasinya seperti diatas jadi cukup menggunakan tty1 saja caranya tambahkan # pada tty2-tty5
tty1
#tty2
#tty3
#tty4
#tty5
Begitu juga dengan vc cukup gunakan vc/1 saja. E. Membuang account yang tidak perlu Maksud account yang tidak perlu ialah account yang dibuat automatik oleh vendor dari paket yang telah diinstall ataupun tidak. Terkadang terdapat sebuah account tapi paket tersebut tidak diinstall. Gunanya account automatik tersebut ialah memudahkan pengecekan untuk melihat update paket (software). Contoh sederhana dalam file contoh file /etc/passwd terdapat account ftp namun server tersebut tidak memberikan layanan ftp jadi account tersebut harus dihapus begitu juga dengan account yang lain. Namun pada intinya semakin banyak account pada /etc/passwd semakin mudah untuk mengakses sistem dan tentu saja tidak menyenangkan. Isi file /etc/passwd :

root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin: daemon:x:2:2:daemon:/sbin: adm:x:3:4:adm:/var/adm: lp:x:4:7:lp:/var/spool/lpd: sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt mail:x:8:12:mail:/var/spool/mail:

news:x:9:13:news:/var/spool/news: uucp:x:10:14:uucp:/var/spool/uucp: operator:x:11:0:operator:/root: games:x:12:100:games:/usr/games: gopher:x:13:30:gopher:/usr/lib/gopher-data:
ftp:x:14:50:FTP User:/home/ftp: nobody:x:99:99:Nobody:/:
xfs:x:43:43:X Font Server:/etc/X11/fs:/bin/false named:x:25:25:Named:/var/named:/bin/false postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bash pii:x:500:500:pii:/home/pii:/bin/bash ipin:x:501:501::/home/ipin:/bin/bash
* untuk menghapus user gunakan

# userdel nama_account

Account yang dihapus

# userdel adm # userdel lp # userdel shutdown # userdel halt # userdel news # userdel mail # userdel uucp # userdel operator # userdel games # userdel gopher # userdel ftp

Setelah menghapus username jadi grup juga harus dihapus. Caranya menghapus

#groupdell nama_grup
Buka file /etc/group

root:x:0:root
bin:x:1:root,bin,daemon daemon:x:2:root,bin,daemon sys:x:3:root,bin,adm adm:x:4:root,adm,daemon
tty:x:5:
disk:x:6:root
lp:x:7:daemon,lp
mem:x:8:
kmem:x:9:
wheel:x:10:root

mail:x:12:mail
news:x:13:news
uucp:x:14:uucp
man:x:15:
games:x:20:
gopher:x:30:
dip:x:40:
ftp:x:50:
nobody:x:99:
users:x:100:
floppy:x:19:
xfs:x:43:
named:x:25:

# groupdel adm
# groupdel lp
#groupdel shutdown
# groupdelhalt
# groupdel news
# groupdel mail
# groupdel uucp
# groupdel operator
# groupdel games
# groupdel gopher
# groupdel ftp

Kesimpulan dari penghapusan user dan grup ialah menghapus account dimana tidak dibutuhkan dan tidak terdapat service dalam server atau linux. Seperti contoh diatas tidak menyediakan ftp jadi user dan grup ftp dihapus, begitu juga dengan news, gropher dll. Semakin sedikit account yang terdapat di /etc/passwd, /etc/group, /etc/passwd semakin secure linux. Selain mengatur account juga memberikan imunitas terhadap file /etc/passwd, /etc/group, /etc/shadow, /etc/gshadow
# chattr +i /etc/passwd
# chattr +i /etc/shadow
# chattr +i /etc/group
# chattr +i /etc/gshadow

Shell Logging
Jika user sering berinteraksi dengan shell jadi cara singkat untuk menampilkan perintah yang sudah dijalankan ialah dengan cara menekan tombol panah bawah dan atas. Kerana setiap user mempunyai file .bash_history. Dimana dalam file tersebut terdapat history command. Kasus sederhana ketika user meninggalkan Pcnya untuk sementara waktu misalnya ke kamar mandi jadi shell akan mudah melihat perintah yang telah diketikkan user. Untuk menanggulangi keadaan tersebut bagi user atau root sekalipun edit file /etc/profile HOSTNAME=`/bin/hostname` HISTSIZE=1000. Ubah HISTSIZE (history size) dengan nilai 0 Sehingga menjadi HOSTNAME=`/bin/hostname`HISTSIZE=0. Dengan demikian setiap user ataupun root sekalipun tidak mempunyai histroy command lagi. Tentu ini cara yang terbaik menjaga agar system ok.
Keadaan Log Salah satu pertimbangan keokan yang paling utama adalah menjaga keokan file dibawah /var/log/. Di dalam direktory tersebut tercatat semua aktivitas system baik yang dilakukan user atau root. Sehingga jika system telah di crack jadi langkah terakhir ialah menjaga /var/log/ kerana pengawasan system terdapat di bawah direktory /var/log/. Setiap aktivitas yang terjadi di catat dalam sebuah log berdasarkan aplikasi masing-masing. Oleh kerana itu sebuah file log seharusnya hanya bias di tulis dan tidak untuk di hapus isinya. Untuk memberi hak akses agar file log hanya bias di tulis saja jadi tambahkan perintah #chttr +a nama_log jika seseorang masuk ke system, pastinya untuk tidak meninggalkan jejak dia harus menghapus file log terlebih dahulu, namun dengan hak akses diatas file log hanya mampu di tulis (append). Daftar Pustaka Red Hat Linux 8.0 The Official Red Hat Linux Security Guide. 2002 by Red Hat, Inc.