Setuid

Results: 53



#Item
1Linux Storage Paul Cobbaut Linux Storage Paul Cobbaut Paul Cobbaut

Linux Storage Paul Cobbaut Linux Storage Paul Cobbaut Paul Cobbaut

Add to Reading List

Source URL: linux-training.be

Language: English - Date: 2015-05-24 09:25:21
2Linux Security Paul Cobbaut Linux Security Paul Cobbaut Paul Cobbaut

Linux Security Paul Cobbaut Linux Security Paul Cobbaut Paul Cobbaut

Add to Reading List

Source URL: linux-training.be

Language: English - Date: 2015-05-24 09:28:07
3Securing Apache on Unix/Linux  Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: www.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
4Linux/Unix privileges from a blackhats perspective I always somehow struggled understanding fully Unix privileges. Therefore the following essay is for my own understanding and improvement (It really sticks in my brain,

Linux/Unix privileges from a blackhats perspective I always somehow struggled understanding fully Unix privileges. Therefore the following essay is for my own understanding and improvement (It really sticks in my brain,

Add to Reading List

Source URL: incolumitas.com

Language: English
5Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
6Chmod / System administration / Setuid / Find / Ls / GNU Core Utilities / Computer file / Rm / Tar / Test / Su / Grep

CS126-1502A-01: Unix Fundamentals

Add to Reading List

Source URL: maxw3st.us

Language: English - Date: 2015-06-03 12:06:05
7,ch05Page 146 Thursday, November 18, :36 PM  Chapter 5i 5 CHAPTER

,ch05Page 146 Thursday, November 18, :36 PM Chapter 5i 5 CHAPTER

Add to Reading List

Source URL: www.modperlbook.org

Language: English - Date: 2015-09-27 19:47:13
8Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:08
    9Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu  Abstract

    Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2014-03-25 14:11:54
    10DOCKER SECURITY CHEAT SHEET DISCLAIMER: The following tips should help you to secure a container based system. They are not a complete solution and will not in themselves guarantee security. They should only form a small

    DOCKER SECURITY CHEAT SHEET DISCLAIMER: The following tips should help you to secure a container based system. They are not a complete solution and will not in themselves guarantee security. They should only form a small

    Add to Reading List

    Source URL: container-solutions.com

    Language: English - Date: 2015-12-29 06:24:45