Unix security

Results: 312



#Item
141Distributed computing architecture / Security / Capability-based security / Operating system / Directory service / Unix / File system / NLTSS / Computer architecture / Computing / Amoeba

The Amoeba Reference Manual User Guide AMOEBA

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2000-06-20 03:20:23
142Insert key / HTML element / Ed / Software / Computing / Unix

BioSIRT INVESTIGATION FORM Section 4 : Operational information Case #: ……………………….. Page[removed]of 2 Operational information Describe security (fences, gates, roads, stock routes, rights-of-way)

Add to Reading List

Source URL: www.dpi.nsw.gov.au

Language: English - Date: 2011-07-25 21:15:20
143System software / Cross-platform software / National Security Agency / Security-Enhanced Linux / Daemon / Cron / Setuid / Debian / Linux / Computing / Software / Unix

Red Hat Enterprise Linux 6 Security Feature Overview Steve Grubb Principal Engineer, Red Hat June 23, 2010

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 12:06:36
144Learning management system / Computer icon / Portable Document Format / Rm / Unix security / File system / Computing / Filesystem permissions / Computer file

Learning Management System user guide

Add to Reading List

Source URL: www.lms.unimelb.edu.au

Language: English - Date: 2014-12-08 19:16:20
145Software / Control flow / Computer security / Rootkits / Chmod / Hooking / Password / Unix signal / Inetd / Computing / System software / Malware

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS GOT [MAC]ROOT? Peter Ferrie Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
146Software / Unix security / Filesystem permissions / Passwd / Ls / Privilege / Shadow password / Home directory / Rm / Unix / System software / Computing

Getting Started with Linux Permissions Mike Jager Network Startup Resource Center

Add to Reading List

Source URL: web.nsrc.org

Language: English - Date: 2014-11-26 17:36:53
147Computer programming / SIGUSR1 and SIGUSR2 / Apache HTTP Server / Kill / C / Unix signal / Zombie process / Process management / Array data type / Computing / Process / Software

Apache Prefork MPM vulnerabilities

Add to Reading List

Source URL: security.psnc.pl

Language: English - Date: 2014-01-14 08:11:35
148Searching / Unix / Disk file systems / Okapi BM25 / Inode / Unix security / Chmod / NTFS / Search engine indexing / Information science / Computing / Information retrieval

A Security Model for Full-Text File System Search in Multi-User Environments Stefan B¨uttcher and Charles L. A. Clarke School of Computer Science University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: stefan.buettcher.org

Language: English - Date: 2006-04-07 00:52:48
149Learning management system / Computer icon / Portable Document Format / Rm / Unix security / File system / Computing / Filesystem permissions / Computer file

Learning Management System user guide

Add to Reading List

Source URL: lms.unimelb.edu.au

Language: English - Date: 2014-12-08 19:16:20
150Unix / Access control / System administration / Cryptographic software / Secure Shell / Privilege separation / OpenSSH / Privilege / Principle of least privilege / System software / Computer security / Software

CITI Technical Report[removed]Preventing Privilege Escalation Niels Provos [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-08-05 18:22:53
UPDATE