Passwd

Results: 95



#Item
21Checking for Race Conditions in File Accesses Matt Bishop, Michael Dilger Department of Computer Science University of California at Davis Davis, CAAbstract

Checking for Race Conditions in File Accesses Matt Bishop, Michael Dilger Department of Computer Science University of California at Davis Davis, CAAbstract

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
22The landscape  David Morgan © David Morgan

The landscape David Morgan © David Morgan

Add to Reading List

Source URL: homepage.smc.edu

Language: English - Date: 2014-09-10 17:43:27
23FreeBSD command reference Command structure Each line you type at the Unix shell consists of a command optionally followed by some arguments, e.g. ls -l /etc/passwd | | |

FreeBSD command reference Command structure Each line you type at the Unix shell consists of a command optionally followed by some arguments, e.g. ls -l /etc/passwd | | |

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-24 00:34:41
    24Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

    Add to Reading List

    Source URL: nsrc.cse.psu.edu

    Language: English - Date: 2015-04-16 15:07:31
    25This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2011-07-10 02:35:13
    26Password / Group identifier / User identifier / Shadow password / Passwd / Filesystem permissions / Unix security / Unix / System software / Software

    Rating Against Industry Average X

    Add to Reading List

    Source URL: www.sekchek.com

    Language: English - Date: 2013-11-13 04:19:14
    27CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

    CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

    Add to Reading List

    Source URL: www.cerias.purdue.edu

    Language: English - Date: 2015-02-13 11:29:28
    28The Minix3 Notes ­­ Rahmat M. Samik­Ibrahim ­­ http://rms46.vlsm.orgpdf ­­ revision 09­09­09­06 ­­ 1 (c) 2007­2009 All Rights Reversed, All Wrongs Corrected ­­ Permission is 

    The Minix3 Notes ­­ Rahmat M. Samik­Ibrahim ­­ http://rms46.vlsm.orgpdf ­­ revision 09­09­09­06 ­­ 1 (c) 2007­2009 All Rights Reversed, All Wrongs Corrected ­­ Permission is 

    Add to Reading List

    Source URL: rms46.vlsm.org

    Language: English - Date: 2011-02-06 10:26:00
    29UNIX - GETTING STARTED http://www.tuto rialspo int.co m/unix/unix-g e tting -starte d.htm Co pyrig ht © tuto rials po int.co m  What is Unix ?

    UNIX - GETTING STARTED http://www.tuto rialspo int.co m/unix/unix-g e tting -starte d.htm Co pyrig ht © tuto rials po int.co m What is Unix ?

    Add to Reading List

    Source URL: www.tutorialspoint.com

    Language: English - Date: 2014-05-24 08:46:10
    30Computing / System administration / Internet protocols / Internet standards / Unix security / Shadow password / Password / Passwd / Su / System software / Unix / Software

    TESTBED Linux SekChek for UNIX Security Report System: Linuxwhite 9 November 2013

    Add to Reading List

    Source URL: www.sekchek.com

    Language: English - Date: 2013-11-09 10:37:19