Unix security

Results: 312



#Item
21Computing / Software / System software / Ls / Cablevision / Unix security / Sed / Monosodium glutamate / MSG / Dir

The Return of Unix Command-Line Kung Fu @Hal_Pomeranz Who Is Hal Pomeranz? 

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2010-09-22 20:28:10
22

Unix Security Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

Add to Reading List

Source URL: www.opensecuritytraining.info

Language: English - Date: 2013-11-03 14:53:48
    23Cryptography / Cyberwarfare / System administration / Cybercrime / Password / Rootkit / Fsck / Su / Malware / Computer security / Password cracking / Password manager

    How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates Who Am I?

    Add to Reading List

    Source URL: www.deer-run.com

    Language: English - Date: 2004-08-16 11:51:23
    24Software / System software / Computer architecture / FreeBSD / Chroot / FreeBSD jail / Procfs / Root directory / Unix security / Securelevel / Operating system / File system

    Jails: Confining the omnipotent root. Poul-Henning Kamp <> Robert N. M. Watson <> The FreeBSD Project ABSTRACT

    Add to Reading List

    Source URL: us-east.manta.joyent.com

    Language: English - Date: 2016-01-19 17:45:24
    25

    Smoot Carl-Mitchell Scottsdale, AZ Unix and Network System Architecture, Security and Administration e-mail: Voice: +Cell: +

    Add to Reading List

    Source URL: tic.com

    Language: English - Date: 2004-09-21 19:49:48
      26Password / Security / Cryptography / Unix / Passwd / Monosodium glutamate / Crypt / Guessing / Name Service Switch

      How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

      Add to Reading List

      Source URL: www.qatar.cmu.edu

      Language: English - Date: 2004-12-05 23:21:27
      27

      NCSC-TG-020-A VERSION-1 NATIONAL COMPUTER SECURITY CENTER TRUSTED UNIX WORKING GROUP (TRUSIX) RATIONALE FOR SELECTING

      Add to Reading List

      Source URL: zedz.net

      Language: English - Date: 2002-12-08 10:16:43
        28Computing / Software / Internet / Unix / Internet security / Secure communication / System administration / USENIX / Tor

        Eric Wustrow https://ericw.us/trow Current Address 1885 Fuller Rd Ann Arbor, MIphone:

        Add to Reading List

        Source URL: ericw.us

        Language: English - Date: 2014-05-23 17:01:56
        29Software / Computing / Oracle Database / Oracle Corporation / Database / Oracle Forms / Oracle Application Express

        Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is getting even more i

        Add to Reading List

        Source URL: fritshoogland.files.wordpress.com

        Language: English - Date: 2010-01-20 16:35:34
        30

        A TAXONOMY OF SECURITY FAULTS IN THE UNIX OPERATING SYSTEM A Thesis Submitted to the Faculty of Purdue University by

        Add to Reading List

        Source URL: cwe.mitre.org

        Language: English - Date: 2008-10-29 17:41:00
          UPDATE