Unix

Results: 4494



#Item
1Cracking Unix passwords using FPGA platforms Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede COSIC, Katholieke Universiteit Leuven SHARCS

Cracking Unix passwords using FPGA platforms Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede COSIC, Katholieke Universiteit Leuven SHARCS

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2005-03-13 11:15:53
2CNC Milling for Makers  Christian Rattat began his career on a Commodore Amiga 2000 in the 1980s and has been developing software ever since. He works for large corporations in Microsoft and Unix environments, and also

CNC Milling for Makers Christian Rattat began his career on a Commodore Amiga 2000 in the 1980s and has been developing software ever since. He works for large corporations in Microsoft and Unix environments, and also

Add to Reading List

Source URL: www.stepcraft-systems.com

Language: English - Date: 2017-08-02 03:47:54
    3Cluster 3.0 Manual for Windows, Mac OS X, Linux, Unix Michael Eisen; updated by Michiel de Hoon  c Stanford UniversityThis manual was originally written by

    Cluster 3.0 Manual for Windows, Mac OS X, Linux, Unix Michael Eisen; updated by Michiel de Hoon c Stanford UniversityThis manual was originally written by

    Add to Reading List

    Source URL: bonsai.hgc.jp

    Language: English - Date: 2018-04-29 00:18:40
      4Information for ISC Users Michael Rohleder 05 MarchX11R6/XFree86 on Interactive Unix This document provides some additional information about compiling and using X11R6 and

      Information for ISC Users Michael Rohleder 05 MarchX11R6/XFree86 on Interactive Unix This document provides some additional information about compiling and using X11R6 and

      Add to Reading List

      Source URL: xfree86.org

      Language: English - Date: 2008-12-29 12:48:49
        5Usenix Winter Conference San Francisco, CaliforniaSUPPORTING CHECKPOINTING AND PROCESS MIGRATION OUTSIDE THE UNIX KERNEL

        Usenix Winter Conference San Francisco, CaliforniaSUPPORTING CHECKPOINTING AND PROCESS MIGRATION OUTSIDE THE UNIX KERNEL

        Add to Reading List

        Source URL: research.cs.wisc.edu

        Language: English - Date: 2012-10-24 18:43:18
          6UNIX/Linux Overview For Law Enforcement Personnel Presented By CJ Fearnley http://www.cjfearnley.com/UNIX-Linux-Basicspdf Modified from a presentation by SSA William W. Blevins Original presentation produced by

          UNIX/Linux Overview For Law Enforcement Personnel Presented By CJ Fearnley http://www.cjfearnley.com/UNIX-Linux-Basicspdf Modified from a presentation by SSA William W. Blevins Original presentation produced by

          Add to Reading List

          Source URL: www.cjfearnley.com

          Language: English - Date: 2007-01-02 17:12:25
            7DATASHEET  The Privileged Access Suite for UNIX Simplify UNIX security and administration and meet compliance requirements

            DATASHEET The Privileged Access Suite for UNIX Simplify UNIX security and administration and meet compliance requirements

            Add to Reading List

            Source URL: www.oneidentity.com

            Language: English - Date: 2017-06-18 23:17:16
              8The Restoration of Early UNIX Artifacts Warren Toomey  School of IT, Bond University Abstract UNIX turns 40 this year: many happy returns! Four

              The Restoration of Early UNIX Artifacts Warren Toomey School of IT, Bond University Abstract UNIX turns 40 this year: many happy returns! Four

              Add to Reading List

              Source URL: www.usenix.org

              Language: English - Date: 2009-05-12 13:09:36
                9Information for ISC Users Michael Rohleder 05 MarchX11R6/XFree86 on Interactive Unix This document provides some additional information about compiling and using X11R6 and

                Information for ISC Users Michael Rohleder 05 MarchX11R6/XFree86 on Interactive Unix This document provides some additional information about compiling and using X11R6 and

                Add to Reading List

                Source URL: xfree86.org

                Language: English - Date: 2008-12-29 12:48:49
                  10The Misuse of Android Unix Domain Sockets and Security Implications Yuru Shao† , Jason Ott∗ , Yunhan Jack Jia† , Zhiyun Qian∗ , Z. Morley Mao† †  University of Michigan, ∗ University of California, Riversid

                  The Misuse of Android Unix Domain Sockets and Security Implications Yuru Shao† , Jason Ott∗ , Yunhan Jack Jia† , Zhiyun Qian∗ , Z. Morley Mao† † University of Michigan, ∗ University of California, Riversid

                  Add to Reading List

                  Source URL: www.cs.ucr.edu

                  Language: English - Date: 2016-10-31 00:33:07