Security banner gallery - pyllyukko/harden.yml GitHub Wiki

Because why not :)

system-hardening-10.2.txt

****************************************************************

 Unauthorized access prohibited; all access and activities not
 explicitly authorized by the administrator are unauthorized.
 All activities are monitored and logged.  There is no privacy
 on this system.  Unauthorized access and activities or any
 criminal activity will be reported to appropriate authorities.

****************************************************************

/etc/lilo.conf menu-title: "Unauthorized Access Prohibited"

Slackware Linux Benchmark v1.1

issue:

*************************************************
NOTICE TO USERS
This is a private system and is the property of
[insert company name here]. It is for authorized
use only. Users (authorized or unauthorized) have
no explicit or implicit expectation of privacy.
Any or all uses of this system and all files on
this system may be intercepted, monitored,
recorded, copied, audited, inspected, and disclosed
to authorized site, and law enforcement
personnel, as well as authorized officials of
other agencies, both domestic and foreign. By
using this system, the user consents to such
interception, monitoring, recording, copying,
auditing, inspection, and disclosure at the
discretion of the authorized site.
Unauthorized or improper use of this system may
result in administrative disciplinary action and
civil and criminal penalties. By continuing to use
this system you indicate your awareness of and
consent to these terms and conditions of use. DO
NOT LOGIN if you do not agree to the conditions
stated in this warning.
**************************************************

motd:

*************************************************
NOTICE TO USERS
Use of this system constitutes consent to security
monitoring and testing. All activity is logged
with your host name and IP address.
*************************************************

Mastering Linux Security and Hardening

https://www.packtpub.com/product/mastering-linux-security-and-hardening/9781788620307

motd:

Warning: Authorized Users Only!

All others will be prosecuted.

Slackware Administrators Security tool kit (SAStk)

*****************************************************
This system is for the use of authorized users only.
           All connections are Logged !!
   Keyboard input will be monitored in the event
     of a real or suspected security incident.

 Use of this system constitutes understanding and
    consent to the aforementioned monitoring.
*****************************************************

Bastille

***************************************************************************
                            NOTICE TO USERS


This computer system is the private property of $owner, whether 
individual, corporate or government.  It is for authorized use only. 
Users (authorized or unauthorized) have no explicit or implicit 
expectation of privacy.  

Any or all uses of this system and all files on this system may be 
intercepted, monitored, recorded, copied, audited, inspected, and 
disclosed to your employer, to authorized site, government, and law 
enforcement personnel, as well as authorized officials of government 
agencies, both domestic and foreign.  

By using this system, the user consents to such interception, monitoring, 
recording, copying, auditing, inspection, and disclosure at the 
discretion of such personnel or officials.  Unauthorized or improper use 
of this system may result in civil and criminal penalties and 
administrative or disciplinary action, as appropriate. By continuing to use
this system you indicate your awareness of and consent to these terms 
and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the 
conditions stated in this warning.  

****************************************************************************

CIS Debian Linux 10 Benchmark v1.0.0

GDM: "Authorized uses only. All activity may be monitored and reported."

Cisco

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/securebasebook/appendxA.html

UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED

You must have explicit, authorized permission to access or configure this device.

Unauthorized attempts and actions to access or use this system may result in civil and/or 
criminal penalties.

All activities performed on this device are logged and monitored.

5 ways to harden a new system with Ansible

https://www.redhat.com/sysadmin/harden-new-system-ansible

issue:

Use of this system is restricted to authorized users only, and all use is subjected to an acceptable use policy.

IF YOU ARE NOT AUTHORIZED TO USE THIS SYSTEM, DISCONNECT NOW.

motd:

THIS SYSTEM IS FOR AUTHORIZED USE ONLY

By using this system, you agree to be bound by all policies found at https://wiki.example.com/acceptable_use_policy.html. Improper use of this system is subject to civil and legal penalties.

All activities are logged and monitored.

PAM Mastery

:)

Your access to this host as %u has been logged.
Unauthorized users will be mercilessly 
trampled by angry Luggage.

Tiger

https://www.nongnu.org/tiger/

----------------------------------------------------------------------
|         * * * * * * * W A R N I N G * * * * * * * * * *            |
|                                                                    |
| THIS IS A PRIVATE SYSTEM. It is for authorized use only.           |
|                                                                    |
| This computer system including all related equipment, network      |
| devices (specifically including Internet access), are provided     |
| for  AUTHORIZED USE ONLY.                                          |
|                                                                    |
| Users (authorized or unauthorized) have no explicit or implicit    |
| expectation of privacy.                                            |
|                                                                    |
| Any or all uses of this system and all files on this system may    |
| be intercepted, monitored, recorded, copied, audited, inspected,   |
| and disclosed to authorized site and law enforcement personnel,    |
| as well as authorized officials of other agencies, both domestic   |
| and foreign.  By using this system, the user consents to such      |
| interception, monitoring, recording, copying, auditing, inspection,|
| and disclosure at the discretion of authorized site personnel.     |
|                                                                    |
| Unauthorized or improper use of this system may result in          |
| administrative disciplinary action and civil and criminal          |
| penalties. By continuing to use this system you indicate your      |
| awareness of and consent to these terms and conditions of use.     |
| LOG OFF IMMEDIATELY if you do not agree to the conditions stated   |
| in this warning.                                                   |
|                                                                    |
----------------------------------------------------------------------