/freebsd/crypto/krb5/doc/html/_sources/user/ |
H A D | pwd_mgmt.rst.txt | 4 Your password is the only way Kerberos has of verifying your identity. 5 If someone finds out your password, that person can masquerade as 6 you---send email that comes from you, read, edit, or delete your files, 9 password, and keep it secret. If you need to give access to your 11 :ref:`grant_access`). You should never tell your password to anyone, 12 including your system administrator, for any reason. You should 13 change your password frequently, particularly any time you think 17 Changing your password 20 To change your Kerberos password, use the :ref:`kpasswd(1)` command. 21 It will ask you for your old password (to prevent someone else from [all …]
|
H A D | tkt_mgmt.rst.txt | 6 can forward copies of your tickets to a remote host. Most of these 7 programs also automatically destroy your tickets when they exit. 8 However, MIT recommends that you explicitly destroy your Kerberos 11 to your .logout file. Additionally, if you are going to be away from 12 your machine and are concerned about an intruder using your 13 permissions, it is safest to either destroy all copies of your 100 If your site has integrated Kerberos V5 with the login system, you 102 you may need to explicitly obtain your Kerberos tickets, using the 103 :ref:`kinit(1)` program. Similarly, if your Kerberos tickets expire, 106 To use the kinit program, simply type ``kinit`` and then type your [all …]
|
/freebsd/crypto/krb5/doc/user/ |
H A D | pwd_mgmt.rst | 4 Your password is the only way Kerberos has of verifying your identity. 5 If someone finds out your password, that person can masquerade as 6 you---send email that comes from you, read, edit, or delete your files, 9 password, and keep it secret. If you need to give access to your 11 :ref:`grant_access`). You should never tell your password to anyone, 12 including your system administrator, for any reason. You should 13 change your password frequently, particularly any time you think 17 Changing your password 20 To change your Kerberos password, use the :ref:`kpasswd(1)` command. 21 It will ask you for your old password (to prevent someone else from [all …]
|
H A D | tkt_mgmt.rst | 6 can forward copies of your tickets to a remote host. Most of these 7 programs also automatically destroy your tickets when they exit. 8 However, MIT recommends that you explicitly destroy your Kerberos 11 to your .logout file. Additionally, if you are going to be away from 12 your machine and are concerned about an intruder using your 13 permissions, it is safest to either destroy all copies of your 100 If your site has integrated Kerberos V5 with the login system, you 102 you may need to explicitly obtain your Kerberos tickets, using the 103 :ref:`kinit(1)` program. Similarly, if your Kerberos tickets expire, 106 To use the kinit program, simply type ``kinit`` and then type your [all …]
|
/freebsd/sys/contrib/zstd/ |
H A D | CONTRIBUTING.md | 14 We actively welcome your pull requests. 16 1. Fork the repo and create your branch from `dev`. 20 5. Make sure your code lints. 24 In order to accept your pull request, we need you to submit a CLA. You only need 27 Complete your CLA here: <https://code.facebook.com/cla> 37 * Checkout your fork of zstd if you have not already 42 * Update your local dev branch 48 * Make a new branch on your fork about the topic you're developing for 60 * Note: run local tests to ensure that your changes didn't break existing functionality 71 …* Before sharing anything to the community, create a pull request in your own fork against the dev… [all …]
|
/freebsd/tools/tools/git/ |
H A D | HOWTO | 13 should demonstrate a logical progression towards your end goal. For example, 15 any current functionality. A subsequent commit could then introduce your new 18 It usually will not be helpful to present your code in the order in which it 20 introduced a bug early in your development process that you fixed in a 21 subsequent commit, it is a waste of your reviewer's time to have them review 24 presented to your reviewers in any review. 28 gives your reviewers the necessary context to understand your change. 30 2. Create your reviews by running this command in your git repo: 49 Next, make your change and perform whatever testing is necessary. Commit it 50 to your repository with this command: [all …]
|
/freebsd/contrib/ntp/ |
H A D | README.pullrequests | 14 in seeing that work in the current production release then base your work 15 on the stable branch, and pull your work into a master copy to allow for 16 publishing your changes in the ntp-dev or master branch. 18 If there is no expectation that your work will be included in the 19 current stable release (the ntp-stable code) then it's better to do your 24 It's possible that after pulling your changes from stable to master that 29 incorporate your work. 31 Please also note that your submissions will be able to be evaluated and 32 handled sooner if the repo that contains your pull requests also includes 37 1) If you haven't, create a fork of ntp-project/ntp with your github account. [all …]
|
H A D | README.patches | 11 > (make and test your changes to ntp-stable first) 12 > (commit your changes to ntp-stable) 14 > bk pull ../ntp-stable (get your changes from ntp-stable) 15 > (resolve any problems and test your changes) 16 > (commit your changes to ntp-dev) 22 If you make your changes in the above order and then submit them, 23 it will be trivial to apply your patches. 25 Otherwise, it will be much more difficult to apply your patches. 27 You are pretty much done now if your repos are on pogo.udel.edu. 37 If you cannot easily get your patches to pogo, you may submit patches [all …]
|
/freebsd/share/doc/usd/07.mail/ |
H A D | mail3.nr | 36 where you wish to keep your folders. Each folder of messages will 37 be a single file. For convenience, all of your folders are kept in 38 a single directory of your choosing. To tell 40 where your folder directory is, put a line of the form 44 in your 46 file. If, as in the example above, your folder directory does not 49 will assume that your folder directory is to be found starting from 50 your home directory. Thus, if your home directory is 54 to find your folder directory in 71 command are automatically removed from your system mailbox. [all …]
|
H A D | mail2.nr | 42 then type your message. When you reach the end of the message, type 50 to alert him to the existence of your message. 64 to save your partial letter on the file 66 in your home directory and abort the letter. 71 The message your recipient reads will consist of the message you 72 typed, preceded by a line telling who sent the message (your login name) 99 your command. The messages are assigned numbers starting with 1 \*- you 104 (have been sent since you last read your mail) and 116 into your messages. 163 Frequently, it is useful to read the messages in your mailbox in order, [all …]
|
H A D | mail4.nr | 45 which will print a line of dashes, the recipients of your message, and 51 ~ escape without killing your letter. 60 your satisfaction, write it out and quit the editor. 67 after which you may continue typing text which will be appended to your 84 editor, on your current message, you can use the escape, 96 file in your message; the escape 101 to your current message. 105 characters appended to your message is printed, after which you may continue 107 which are expanded according to the conventions of your shell. 115 in your home directory. This is often useful since [all …]
|
H A D | mail5.nr | 32 reading your mail, setting options, and handling lists of messages. 165 tilde escapes. The subject in your reply is formed by prefacing the 175 You type in your message using the same conventions available to you 207 your mail to a single account. 231 command allows you to change your current directory. 236 changes to your home directory. 270 When you have edited the message to your satisfaction, write the message 291 without updating the system mailbox or the file your were reading. 294 to avoid scrambling your mailbox. 301 List the names of the folders in your folder directory. [all …]
|
/freebsd/usr.sbin/bsdconfig/include/ |
H A D | network_device.hlp | 21 If you're using a modem then PPP is almost certainly your only choice. 22 Make sure that you have your service provider's information handy as 24 will need to know your service provider's IP address, the IP address 25 of your provider's DNS server, and possibly your own IP address unless 26 your ISP supports dynamic negotiation, most do. If you do not choose 28 "AT commands" to dial the ISP with your particular brand of modem as 31 can simply enter `dial' (without the quotes) at the ppp prompt if your 48 You will also need to know your IP address on the network, the 49 "netmask" value for your address class, and the name of your machine. 50 Your system administrator can tell you which values to use for your [all …]
|
/freebsd/contrib/kyua/ |
H A D | CONTRIBUTING.md | 6 to get your changes incorporated. 12 * Before we can use your code, you must sign the 16 mainly because you own the copyright to your changes, even after your 17 contribution becomes part of our codebase, so we need your permission to use 18 and distribute your code. We also need to be sure of various other 19 things--for instance that you will tell us if you know that your code 21 after you have submitted your code for review and a member has approved it, 22 but you must do it before we can put your code into our codebase. 28 Please get your company to sign this agreement instead if your contribution is 31 * Unless you have a strong reason not to, please assign copyright of your [all …]
|
/freebsd/crypto/krb5/src/windows/leash/htmlhelp/html/ |
H A D | Kerberos.htm | 32 <td> Your Kerberos identity (your <em><a href="JavaScript:popup.TextPopup(popupPrincipal, popfont,… 33 and your password allow you to log on just once to access all of the 35 No matter how many resources you use, you will not need to enter your 44 provides <i>mutual</i> authentication, so in addition to proving your 53 Kerberos prevents malicious attempts to intercept your password by 54 encrypting your password before transmitting it. In addition, once you 55 and the server have proved your identities to each other, Kerberos uses 56 secret-key cryptography to secure the rest of your communications. This 57 helps maintain your privacy and the integrity of your data.</td> 69 …that of the real company. If you try to log on, the fake website harvests your username and passwo… [all …]
|
H A D | Tickets.htm | 11 The MIT Kerberos program helps you manage your Kerberos tickets. Click 12 the Get Ticket button and enter your principal (your Kerberos identity) 16 enter your password again. </p> 45 <tr><td colspan="2">Your tickets are valid for a set amount of time 48 warns you 15, 10, and 5 minutes before your tickets expire. To add an 53 <td>When you get your ticket, click Show Advanced to view and adjust 57 your tickets. After the time listed in this column, the ticket will 67 <tr><td colspan="2">When you get your ticket, you have the option of 70 without continually reentering your password. <p></p> 74 time you renew your ticket, Kerberos resets the ticket lifetime to the [all …]
|
H A D | Glossary.htm | 13 <dd> Your default principal is the one whose tickets are used when an application or service asks f… 19 …he type of encryption used to encode your tickets and session keys. You can show the encryption t… 22 <dd> Optional audible alarm that warns you 15, 10, and 5 minutes before your tickets expire. Turn t… 35 <dd>The date and time that your tickets were issued. Show or hide this information with the View O… 41 …identity you use to log on with Kerberos. Principals are a combination of your user name and the n… 46 …ing resources and identities that use Kerberos. Your realm is the home of your Kerberos identity a… 50 <dd> The date and time after which your renewable tickets cannot be renewed any more. Show or hide … 53 …y owns, such as a phone). If your company uses RSA SecurID, you will need to enter your SecurID pa… 59 …and decrypt communications between computers. View the encryption type of your session keys by sel… 65 <dd> Obtain your ticket by entering your user name and password. The ticket is an encrypted block o… [all …]
|
H A D | Principals.htm | 11 Your principal is your Kerberos identity. It is your user name plus the Kerberos <a href="JavaScrip… 28 …your realm, so when you start to enter your principal in the Get Ticket window it will auto-comple… 30 The main window shows your principal, along with information about tickets issued to it. <br> 47 Your default principal appears in bold font in the main window. If you have a single principal, tha… 49 …d application, the application attempts to authenticate you by requesting your credentials from Ke… 51 When applications make a generic request, Kerberos does not know which of your principals is being … 54 To set your default principal, select a principal in the main window and then click the Make Defaul… 62 popupKeyboardShortcut="To use a keyboard shortcut, hold down the [Ctrl] key on your computer keyboa…
|
H A D | Get_Tickets.htm | 14 …obtain a Kerberos ticket. If your company uses RSA SecurID to control access to Kerberos, you will… 19 …Your principal is your user name combined with the Kerberos <a href="JavaScript:popup.TextPopup(po… 23 <li>Enter your password. </li> 37 …your company uses RSA SecurID, a popup window will open requiring you to enter your SecurID passwo… 40 Your new ticket is listed in the main window. 53 popupKeyboardShortcut="To use a keyboard shortcut, hold down the [Ctrl] key on your computer keyboa…
|
H A D | Change_Password.htm | 13 To change your password:</p> 18 …t to manage by clicking it in the main window. Or you can wait and enter your principal in the Ch… 22 <li> Verify your principal (your Kerberos identity) or enter a different one. </li> 24 <li>Enter your current password.</li> 26 <li> Enter your new password twice. You must enter it the second time to make sure you have typed i… 37 <li><a href="HTML/Forget_Password.htm">If you forget your password</a></li> 44 popupPrincipal="Your principal is your Kerberos identity. It is your user name combined with the Ke…
|
/freebsd/crypto/krb5/doc/html/user/ |
H A D | pwd_mgmt.html | 57 <p>Your password is the only way Kerberos has of verifying your identity. 58 If someone finds out your password, that person can masquerade as 59 you—send email that comes from you, read, edit, or delete your files, 62 password, and keep it secret. If you need to give access to your 64 …ess"><span class="std std-ref">Granting access to your account</span></a>). You should never tell… 65 including your system administrator, for any reason. You should 66 change your password frequently, particularly any time you think 68 <section id="changing-your-password"> 69 <h2>Changing your password<a class="headerlink" href="#changing-your-password" title="Permalink to … 70 <p>To change your Kerberos password, use the <a class="reference internal" href="user_commands/kpas… [all …]
|
/freebsd/contrib/googletest/ |
H A D | CONTRIBUTING.md | 1 # How to become a contributor and submit your own code 5 We'd love to accept your patches! Before we can take them, we have to jump a 14 * If you work for a company that wants to allow you to contribute your work, 20 accept your pull requests. 30 1. Submit an issue describing your proposed change to the 36 This ensures that work isn't being duplicated and communicating your plan 38 4. If your proposed change is accepted, and you haven't already done so, sign a 41 5. Fork the desired repo, develop and test your code changes. 42 6. Ensure that your code adheres to the existing style in the sample to which 44 7. Ensure that your code has an appropriate set of unit tests which all pass. [all …]
|
/freebsd/crypto/krb5/doc/html/_sources/admin/ |
H A D | appl_servers.rst.txt | 9 clock is within your maximum clock skew of the KDCs. 143 Configuring your firewall to work with Kerberos V5 146 If you need off-site users to be able to get Kerberos tickets in your 147 realm, they must be able to get to your KDC. This requires either 148 that you have a replica KDC outside your firewall, or that you 149 configure your firewall to allow UDP requests into at least one of 150 your KDCs, on whichever port the KDC is running. (The default is port 153 their passwords in your realm, they must be able to get to your 155 you need off-site users to be able to administer your Kerberos realm, 156 they must be able to get to your Kerberos admin server on the [all …]
|
/freebsd/crypto/krb5/doc/admin/ |
H A D | appl_servers.rst | 9 clock is within your maximum clock skew of the KDCs. 143 Configuring your firewall to work with Kerberos V5 146 If you need off-site users to be able to get Kerberos tickets in your 147 realm, they must be able to get to your KDC. This requires either 148 that you have a replica KDC outside your firewall, or that you 149 configure your firewall to allow UDP requests into at least one of 150 your KDCs, on whichever port the KDC is running. (The default is port 153 their passwords in your realm, they must be able to get to your 155 you need off-site users to be able to administer your Kerberos realm, 156 they must be able to get to your Kerberos admin server on the [all …]
|
/freebsd/crypto/openssl/doc/HOWTO/ |
H A D | certificates.txt | 6 How you handle certificates depends a great deal on what your role is. 7 Your role can be one or several of: 50 yourself if you have your own certificate authority or create a 67 complete, they send you your new certificate. 88 was kind enough, your certificate is a raw DER thing in PEM format. 89 Your key most definitely is if you have followed the examples above. 91 things like PKCS7 or PKCS12, or something else. Depending on your 96 So, depending on your application, you may have to convert your 97 certificate and your key to various formats, most often also putting 101 right for your applications, simply concatenating the certificate and [all …]
|