Setuid

Results: 53



#Item
31System software / Cross-platform software / National Security Agency / Security-Enhanced Linux / Daemon / Cron / Setuid / Debian / Linux / Computing / Software / Unix

Red Hat Enterprise Linux 6 Security Feature Overview Steve Grubb Principal Engineer, Red Hat June 23, 2010

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 12:06:36
32Chroot / User identifier / Setuid / Privilege separation / Secure Shell / Principle of least privilege / OpenSSH / Group identifier / Filesystem permissions / Unix / System software / Software

Model Checking One Million Lines of C Code∗ Hao Chen Drew Dean David Wagner UC Berkeley SRI International

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:22
33Unix / POSIX / File system / UTF-8 / Access control list / Linux / Setuid / Password / Cygwin / Software / System software / Computing

Secure Programming for Linux and Unix HOWTO David A. Wheeler Secure Programming for Linux and Unix HOWTO

Add to Reading List

Source URL: www.dwheeler.com

Language: English - Date: 2004-08-22 23:51:26
34System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2004-08-30 22:13:54
35Sudo / Ubuntu / Cloud computing / VM / Virtual machine / Su / Secure Shell / Setuid / Privilege / System software / Software / System administration

Lab 11 Wrap up final projects Hands-on Unix system administration DeCal[removed]Important note This lab is not graded and will not be collected. It is for your reference only. It has some basic instructions for using

Add to Reading List

Source URL: decal.ocf.berkeley.edu

Language: English - Date: 2012-12-06 00:11:54
36Filesystem permissions / Umask / Ln / Symbolic link / Network File System / Tar / Setuid / Ls / Sticky bit / Computing / Unix / System software

Lab 04 File management: starting from / Hands-on Unix system administration DeCal[removed], due[removed]Your answers should only contain commands or brief responses. Please save trees, don’t print out your compute

Add to Reading List

Source URL: decal.ocf.berkeley.edu

Language: English - Date: 2012-12-06 00:11:54
37Unix / Scripting languages / Chmod / System administration / TeX Directory Structure / TeX / Chown / Filesystem permissions / Setuid / Computing / Software / System software

TUGboat, Volume[removed]), No. 1 Software & Tools Making MakeTeXPK safer for UNIX installations Michal Jaegermann

Add to Reading List

Source URL: www.tug.org

Language: English - Date: 1998-03-13 09:58:18
38Software bugs / Time of check to time of use / File system / File locking / File descriptor / Malware / Rm / Off-by-one error / Setuid / Computing / Unix / Software

Model Checking An Entire Linux Distribution for Security Violations Benjamin Schwarz Hao Chen David Wagner {bschwarz, hchen, daw}@cs.berkeley.edu Geoff Morrison

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-10-18 17:59:35
39Computing / User identifier / Chroot / Setuid / Group identifier / Principle of least privilege / Filesystem permissions / Ioctl / Procfs / Unix / System software / Software

Making Linux Protection Mechanisms Egalitarian with UserFS Taesoo Kim and Nickolai Zeldovich MIT CSAIL A BSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
40Unix / Scripting languages / Chmod / System administration / TeX Directory Structure / TeX / Chown / Filesystem permissions / Setuid / Computing / Software / System software

TUGboat, Volume[removed]), No. 1 Software & Tools Making MakeTeXPK safer for UNIX installations Michal Jaegermann

Add to Reading List

Source URL: tug.org

Language: English - Date: 1998-03-13 09:58:18
UPDATE