Unix security

Results: 312



#Item
181Conficker / Scripting languages / Unix shells / Software testing / United States Computer Emergency Readiness Team / Bash / CERT Group of Companies / Vulnerability / Shellshock / Software / Computer security / Computing

US-CERT.gov Performance Metrics (September 2014)

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-10-09 14:41:07
182Cross-platform software / National Security Agency / Security-Enhanced Linux / Fedora Project / Computer network security / Unix / Fedora / Type enforcement / Linux kernel / Software / Computer architecture / System software

Security Guide - A Guide to Securing Fedora Linux

Add to Reading List

Source URL: docs.fedoraproject.org

Language: English - Date: 2013-12-13 19:06:36
183Unix / Cross-platform software / Filesystem Hierarchy Standard / System administration / Linux kernel / Uname / Security-Enhanced Linux / E820 / Procfs / Software / Computing / System software

4.3 Where Data is Stored Weight •3 Description

Add to Reading List

Source URL: creativecommonsng.org

Language: English - Date: 2014-10-14 13:59:11
184Information / Computing / IPsec / Network security / Data security / Internet security / Security and safety features new to Windows Vista / Computer network security / Data / Cryptographic protocols

High Performance Computing Security Jesse Pollard, Senior UNIX Analyst NAVOCEANO MSRC pollard@navo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
185Computing / Shadow password / Filesystem permissions / Passwd / Linux / Group identifier / Password / Operating system / Unix security / Software / System software / Unix

LPI Linux Essentials, School of Open, Nigeria Babafemi Ogunmade @femiogunmade google.com/+BabafemiOgunmade ng.linkedin.com/in/babafemiogunmade

Add to Reading List

Source URL: creativecommonsng.org

Language: English - Date: 2014-10-14 14:00:34
186System administration / Shadow password / Passwd / User identifier / Password / Group identifier / Superuser / Su / User / System software / Software / Unix

Topic 5: Security and File Permissions (weight: [removed]BASIC SECURITY AND IDENTIFYING USER TYPES (Weight: 2) Description

Add to Reading List

Source URL: creativecommonsng.org

Language: English - Date: 2014-10-14 13:59:16
187Computing / Password / Single sign-on / User / Unix / Password fatigue / Password manager / Computer security / Security / Federated identity

Active Directory Account Manager SSO Guide Managing Active Directory Accounts in SSO.   

Add to Reading List

Source URL: adedata.arkansas.gov

Language: English - Date: 2014-09-19 18:44:49
188

*Form Valid Until[removed]State Security Access Form UNIX Account Manager - Remove Removes a Manager with the ability to maintain UNIX accounts (add/delete UNIX accounts and reset passwords).

Add to Reading List

Source URL: adedata.arkansas.gov

- Date: 2014-12-09 11:02:21
    189Computer network security / System administration / Hacking / Software testing / Vulnerability / Ps / Id / Computer security / Operating system / Software / Computing / Unix

    STEPS FOR BUSINESS TO PROTECT AGAINST BASH BUG 26 September 2014 Businesses are urged to protect their IT systems against the Bourne Again Shell (BASH) vulnerability that could allow unauthorised users to access and mani

    Add to Reading List

    Source URL: www.cert.gov.au

    Language: English - Date: 2014-12-10 16:01:52
    190Password / Su / Unix / Identity management / Unix security / Privileged password management / System software / Software / System administration

    *Form Valid Until[removed]State Security Access Form UNIX Account Manager Establishes a Manager to maintain UNIX accounts (add/delete UNIX accounts and reset passwords).

    Add to Reading List

    Source URL: adedata.arkansas.gov

    Language: English - Date: 2014-12-09 10:59:53
    UPDATE