Authenticate the Centralized Network Using NIS(Network Information System)
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.2, No. 3)Publication Date: 2014-03-30
Authors : Upasna Chaudhary; Poonam Kshtriya;
Page : 625-628
Keywords : server; Linux operating system.;
Abstract
Security is the degree of resistance to, or protection from, harm and illegal accessing the services networks. NIS server used for high security in LINUX or another environment. NIS, or Network Information Systems, is a network service that allows authentication and login information to be stored on a centrally located server. This includes the username and password database for login authentication, database of user groups, and the locations of home directories [1]. We use NIS services in centralized Network between client and serve
Other Latest Articles
- Authenticate the Centralized Network Using NIS(Network Information System)
- Effective Backbone Scheduling Replacement Algorithm
- A Comparative Study on Various Security Attacks in MANET
- Trees Outside Forest (TOF) in Pinjore Block of Panchkula District, Haryana
- Trees Outside Forest (TOF) in Pinjore Block of Panchkula District, Haryana
Last modified: 2014-10-02 21:47:06