Unix security

Results: 312



#Item
11Software / System software / Computer architecture / System administration / Secure Shell / Internet Standards / Unix / Cryptographic software / Filesystem Hierarchy Standard / Chroot / OpenSSH / Passwd

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
12System software / Software / Computer architecture / System administration / Secure Shell / Internet Standards / Unix / Cryptographic software / Filesystem Hierarchy Standard / Chroot / OpenSSH / Passwd

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
13Software / System software / Computer architecture / Access control / POSIX / Unix / System calls / Sandbox / Capability-based security / File descriptor / Mandatory access control / Unix domain socket

fig-capsicum-processes.graffle

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-09 05:43:31
14Cloud clients / Portable software / Sandbox / FreeBSD / Unix / Inetd / Chromium / Ioctl / Capability-based security / Google Chrome / Capsicum / Operating system

Capsicum working group Robert N.M. Watson University of Cambridge FreeBSD Developer Summit

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-07-21 06:37:47
15World Wide Web / Cross-platform software / File system permissions / Chmod / Setuid / Umask / Common Gateway Interface / Chroot / Apache HTTP Server / PHP / Application server / Request Tracker

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: www.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
16American brands / Videotelephony / Cisco Systems / Deep packet inspection / Networking hardware / Computer network security / Router / Genentech / Virtual private network

Digital Unix 4.0 Upgrade Plan

Add to Reading List

Source URL: www.cgl.ucsf.edu

Language: English - Date: 2005-08-06 16:58:13
17Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
18Unix / System administration / USENIX / Copyright law of the United States / Copyright / Publication

CONSENT FORM for REFEREED PAPERS Eleventh Symposium On Usable Privacy and Security (SOUPS) July 22-24, 2015, Ottawa, Canada We must receive signed consent forms from all authors of each paper at the time you submit your

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-11-13 16:47:33
19Computer network security / Cyberwarfare / Computing platforms / NetBSD / Kerberos / Kernel / Firewall / HP-UX / Linux / Computer security / Unix / Pkgsrc

Roland Dowdeswell Address elided for online version Phone elided for online version Positions Director, Dowdeswell Security Architecture, Ltd

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2013-08-15 06:56:10
20Computer network security / Computer security / AlienVault / OSSIM / Cyberwarfare / Data security / Cryptography / Security information and event management / Unix / Vulnerability / Threat

UNIX AS A SECOND LANGUAGE By Sandra Henry-Stocker TOOLS Learning AlienVault ITworld | November 2, 2014

Add to Reading List

Source URL: www.alienvault.com

Language: English - Date: 2016-01-25 18:50:34
UPDATE