Unix security

Results: 312



#Item
221Software testing / Oracle Corporation / Oracle Database / Metalink / Vulnerability / Buffer overflow / JavaScript / Unix / Software / Computing / Cross-platform software

Oracle Security Alert #23 Dated: 29 November[removed]Oracle Home Environment Variable Buffer Overflow Description When the ORACLE_HOME environment variable contains 750 bytes or more, a buffer overflow occurs. This buffe

Add to Reading List

Source URL: www.oracle.com

Language: English
222Operating system / Computer architecture / Windows XP / Microsoft Windows / Antivirus software / Windows NT / Unix security / Norton Internet Security / System software / Software / System administration

OIT Minimum Security Standard for Desktop Systems Table of Contents[removed]

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2011-01-19 18:24:36
223Unix / Public computer / Library / Computer security / Computing / Computer terminal

COMPUTER USE POLICY • 60 minute time limit and 15 minute time limit computers are available for public use. SIGN IN WITH STAFF prior to using. • Must be 18 or older unless approved by library staff. • First priorit

Add to Reading List

Source URL: lawlibrary.org

Language: English - Date: 2011-09-15 19:55:15
224National security / Secure communication / Computer network / Telecommunications engineering / Password / Computer security / Unix security / Public safety / Computer network security / Security / Crime prevention

SUNY Downstate Medical Center Computer Standards & Policies The following computer policies and standards have been established centerwide for Downstate Medical Center: 1. Policy DCC04A: Desktop Standards and Policie

Add to Reading List

Source URL: www.downstate.edu

Language: English - Date: 2008-02-14 13:34:22
225Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2008-06-06 09:26:05
226Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2008-06-06 09:26:05
227System administration / Password / Unix / Cryptography / Single sign-on / Unix security / Passwd / Password manager / Password policy / Security / Computer security / System software

40 December 1999/Vol. 42, No. 12 COMMUNICATIONS OF THE ACM USERS ARE NOT THE ENEMY

Add to Reading List

Source URL: hornbeam.cs.ucl.ac.uk

Language: English - Date: 2009-07-23 10:01:04
228Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com [removed] Security Glossary:

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2000-09-18 13:37:46
229Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com [removed] Security Glossary:

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2000-09-18 13:37:46
230Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com [removed] Security Glossary:

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2000-09-18 13:37:46
UPDATE