Passwd

Results: 95



#Item
41Cryptography / System administration / Unix / Password / Salt / Shadow password / Crypt / Password strength / Passwd / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15217

Add to Reading List

Source URL: geodsoft.com

Language: English - Date: 2003-11-09 11:25:55
42Shadow password / Password / Information technology management / Passwd / User identifier / Password manager / Group identifier / Unix / System software / Software

CXL SECURE AZScan Report for Demo 07-Dec:20

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2008-12-08 19:27:47
43Unix / System administration / Shadow password / Passwd / Operating system / Computer file / Password / Su / Environment variable / System software / Software / Computing

AZScan Documentation AZScan Documentation © CXL Ltd., 2008

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2009-12-10 18:28:41
44HTML / Email / Form / Microsoft Excel / Passwd / Features new to Windows XP / Computing / Software / System software

PDF Document

Add to Reading List

Source URL: www.integeo.com

Language: English - Date: 2013-08-27 20:12:51
45Information technology management / Password / Group identifier / Shadow password / User identifier / Filesystem permissions / Passwd / Su / Unix / System software / Software

Summary Report: TESTBED Linux System: Analysis Date: Linuxwhite 04-Nov-2013

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:21:48
46Software / Group identifier / Shadow password / Sticky bit / User identifier / Filesystem permissions / Passwd / Chmod / Symbolic link / Computing / Unix / System software

RTF Document

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2011-06-18 20:59:12
47Cloud computing / Cloud infrastructure / Hadoop / Apache Hadoop / JSON / Pig / Passwd / Computing / Software / Centralized computing

POST pig Table of contents 1 Description..........................................................................................................................2 2 URL...................................................

Add to Reading List

Source URL: hive.apache.org

Language: English - Date: 2014-01-14 13:47:37
48Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
49Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
50System software / Software / File descriptor / Pipeline / Open / Standard streams / Passwd / EAR / File system / Unix / Computing / Inter-process communication

Working with Unix Processes Copyright © 2012 Jesse Storimer. All rights reserved. This ebook is licensed for individual use only. This is a one-man operation, please respect the time and effort that went into this book

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2012-05-18 12:06:30
UPDATE