Unix security

Results: 312



#Item
171Password / Windows Explorer / User / Active Directory / Unix / System administration / Roaming user profile / System software / Software / Computing

GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.2

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-06-03 12:10:57
172MAPICS / OpenOffice.org / IBM System i / Computer security / Information technology audit / Software / Unix / Operating system

eFORMz- Flysheet-MASTER[removed]indd

Add to Reading List

Source URL: www.minisoft.com

Language: English - Date: 2014-12-30 16:06:29
173Malware / Sophos / Denial-of-service attack / Shellshock / Computer virus / Cyberwarfare / Computing / Antivirus software / Computer network security / Computer security

ANATOMY OF A SHELLSHOCK ATTACK “Shellshock” is the name of a serious bug in Bash, a shell commonly used in computers running Linux, UNIX and OS X. Shellshock could allow an attacker to execute malicious commands acro

Add to Reading List

Source URL: sophos.files.wordpress.com

Language: English - Date: 2014-10-06 17:36:14
174Transaction authentication number / User / Computing / Computer security / Unix / System software / Password

WASHINGTON STATE UNIVERSITY INFORMATION TECHNOLOGY SERVICES PULLMAN, WA[removed]NETWORK SERVICES ACCOUNT REQUEST See[removed]for additional instructions.

Add to Reading List

Source URL: www.wsu.edu

Language: English - Date: 2014-02-13 18:32:15
175System administration / USENIX / Unix

SAVE THE DATE 23rd USENIX Security Symposium AUGUST 20–22, 2014 • SAN DIEGO, CA The USENIX Security Symposium brings together researchers, practitioners, system admin­istrators, system programmers, and others inter

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-05-14 18:23:16
176Security / Access control / Identity management / Unix / System administration / Privileged password management / Password policy / System software / Password / Identity management systems

Managing my authority and users 1. WHO CAN MANAGE AUTHORITY DATA & USERS?

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-09-22 06:00:46
177Computer security / Unix / Internet protocols / Shadow password / Challenge-response authentication / Password / Access control / Security

Overview of Red Database 2.5 Roman Simakov, director of system development department RED SOFT CORPORATION About company

Add to Reading List

Source URL: www.firebirdsql.org

Language: English - Date: 2014-11-20 13:08:16
178Internet / Unix / System software / Spamming / Unix security / Email / Computing / Filesystem permissions

Tips for Triand Account Owners Triand Account Owners are considered district level system administrators of the system and have capabilities that other users do not. This document will provide additional information and

Add to Reading List

Source URL: adedata.arkansas.gov

Language: English - Date: 2013-09-17 16:11:35
179Edward Felten / System administration / USENIX / Unix

WASHINGTON, D.C. • AUGUST 14–16, 2013 The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-02-27 22:49:53
180Unix shells / Scripting languages / System administration / Bash / Almquist shell / Su / Man page / GNU / Software / Computing / System software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-09-25 17:03:48
UPDATE