Shadow password

Results: 127



#Item
21Information technology management / Password / Group identifier / Shadow password / User identifier / Filesystem permissions / Passwd / Su / Unix / System software / Software

Summary Report: TESTBED Linux System: Analysis Date: Linuxwhite 04-Nov-2013

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:21:48
22Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

Add to Reading List

Source URL: www.enck.org

Language: English
23Software / Group identifier / Shadow password / Sticky bit / User identifier / Filesystem permissions / Passwd / Chmod / Symbolic link / Computing / Unix / System software

RTF Document

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2011-06-18 20:59:12
24Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
25Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
26Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com [removed] Security Glossary:

Add to Reading List

Source URL: russ.pridemore.org

Language: English - Date: 2010-09-15 18:23:05
27System administration / Unix / Su / Shadow password / Passwd / Home directory / Whoami / Toor / User identifier / System software / Software / Computing

Everything about Linux’ User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis

Add to Reading List

Source URL: lukas-prokop.at

Language: English - Date: 2009-04-19 18:45:00
28Software / Unix security / Filesystem permissions / Passwd / Ls / Privilege / Shadow password / Home directory / Rm / Unix / System software / Computing

Getting Started with Linux Permissions Mike Jager Network Startup Resource Center [removed]

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-11 17:41:45
29Kodu Game Lab / Microsoft Research / Password / World of Warcraft / Comma-separated values / Email / Shadow / Software / Computing / Application software

Macquarie ICT Innovations Centre (MacICT) is a collaboration between the NSW Department of Education & Communities and Macquarie University Building C5B Macquarie University North Ryde 2109

Add to Reading List

Source URL: www.macict.edu.au

Language: English - Date: 2015-03-18 18:34:44
30Network architecture / Internet / Logical Link Control / Modems / Point-to-point protocol / Internet Protocol Control Protocol / Link control protocol / Tunneling protocols / Password authentication protocol / Internet protocols / Computing / Internet standards

unicoi_logo_white_no_shadow[removed])

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-04-09 14:38:44
UPDATE