Setuid

Results: 53



#Item
1Software / System software / Computing / Inter-process communication / SCSI / Disk file systems / Network file systems / Ethernet / ISCSI / File system permissions / Setuid / Fstab

Linux Storage Paul Cobbaut Linux Storage Paul Cobbaut Paul Cobbaut

Add to Reading List

Source URL: linux-training.be

Language: English - Date: 2015-05-24 09:25:21
2System software / Software / Computer architecture / System administration / Setuid / Su / File system permissions / Passwd / Password / Home directory / Chsh / Fstab

Linux Security Paul Cobbaut Linux Security Paul Cobbaut Paul Cobbaut

Add to Reading List

Source URL: linux-training.be

Language: English - Date: 2015-05-24 09:28:07
3World Wide Web / Cross-platform software / File system permissions / Chmod / Setuid / Umask / Common Gateway Interface / Chroot / Apache HTTP Server / PHP / Application server / Request Tracker

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: www.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
4Unix / System administration / Configuration files / File system permissions / Setuid / User identifier / Group identifier / Chmod / Sticky bit / Su / Fstab / Stat

Linux/Unix privileges from a blackhats perspective I always somehow struggled understanding fully Unix privileges. Therefore the following essay is for my own understanding and improvement (It really sticks in my brain,

Add to Reading List

Source URL: incolumitas.com

Language: English
5Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
6Chmod / System administration / Setuid / Find / Ls / GNU Core Utilities / Computer file / Rm / Tar / Test / Su / Grep

CS126-1502A-01: Unix Fundamentals

Add to Reading List

Source URL: maxw3st.us

Language: English - Date: 2015-06-03 12:06:05
7Software / Computing / System software / Process / Unix / Kill / Apache HTTP Server / SIGHUP / Setuid / Httpd / Ps / Server

,ch05Page 146 Thursday, November 18, :36 PM Chapter 5i 5 CHAPTER

Add to Reading List

Source URL: www.modperlbook.org

Language: English - Date: 2015-09-27 19:47:13
8

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:08
    9System software / Software / Computer architecture / System administration / Unix / Access control / Setuid / Privilege separation / Fstab / File system permissions / Principle of least privilege / Mandatory access control

    Practical Techniques to Obviate Setuid-to-Root Binaries Bhushan Jain, Chia-Che Tsai, Jitin John, and Donald E. Porter Stony Brook University {bpjain, chitsai, jijjohn, porter}@cs.stonybrook.edu Abstract

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2014-03-25 14:11:54
    10Docker / Free software / Setuid / Operating-system-level virtualization / Cgroups / Intermodal container / LXC

    DOCKER SECURITY CHEAT SHEET DISCLAIMER: The following tips should help you to secure a container based system. They are not a complete solution and will not in themselves guarantee security. They should only form a small

    Add to Reading List

    Source URL: container-solutions.com

    Language: English - Date: 2015-12-29 06:24:45
    UPDATE