Setuid

Results: 53



#Item
11

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.miami.edu

Language: English
    12Software / Time of check to time of use / Setuid / Symbolic link / Ln / File system / Procfs / Inode / Filesystem permissions / Computing / System software / Unix

    Fixing Races for Fun and Profit: How to abuse atime Nikita Borisov Rob Johnson Naveen Sastry David Wagner

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:51
    13Hacking / Software testing / Failure / Vulnerability / Setuid / File system / Exploit / File descriptor / Social vulnerability / Computer security / Unix / Cyberwarfare

    Checking for Race Conditions in File Accesses Matt Bishop and Michael Dilger CSESeptember 1995 Checking for Race Conditions in File Accesses

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:55:49
    14Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing

    View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2010-03-04 18:26:58
    15

    Writing Safe Privileged Programs Writing Safe Setuid Programs Matt Bishop Department of Computer Science University of California at Davis

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    Language: English - Date: 2004-06-21 18:55:47
      16Mac OS X / Unix / Computer configuration / System administration / Setuid / FileVault / Filesystem Hierarchy Standard / Mac OS X Leopard / Environment variable / System software / Software / Computing

      The following tips assume that the reader is starting with a default installation of Mac OS XLeopard). These tips may not translate gracefully for previous versions. Important: System updates may override many of

      Add to Reading List

      Source URL: www.nsa.gov

      Language: English - Date: 2008-11-12 13:16:34
      17Unix / Network architecture / Data security / Hacking / Internet protocols / Firewall / User identifier / Stateful firewall / Setuid / Computer network security / Computing / Computer security

      CS 155: Spring 2004 June 2004 CS 155 Final Exam This exam is open books and open notes, but you may not use a laptop. You have 2 hours. Make sure you print your name legibly and sign the honor code below. All of the inte

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2012-04-06 01:23:14
      18Computing / User identifier / Setuid / Group identifier / Principle of least privilege / Filesystem permissions / Privilege / Superuser / Operating system / System software / Software / Unix

      UNIX Basics WENDY GROSSMAN by Peter Collinson, Hillside Systems

      Add to Reading List

      Source URL: www.hillside.co.uk

      Language: English - Date: 2001-11-27 10:12:20
      19Software / Chmod / Filesystem permissions / Setuid / Sticky bit / Cp / Inode / Group identifier / Ls / Computing / Unix / System software

      UNIX Basics BEK SHAKIROV by Peter Collinson, Hillside Systems

      Add to Reading List

      Source URL: www.hillside.co.uk

      Language: English - Date: 2001-11-27 10:09:47
      20Software / User identifier / Group identifier / Setuid / Chmod / Filesystem permissions / Privilege separation / Superuser / Privilege / Unix / Computing / System software

      writing_secure_privileged_programs-PRINTABLE

      Add to Reading List

      Source URL: man7.org

      Language: English - Date: 2015-05-07 06:42:59
      UPDATE