Unix security

Results: 312



#Item
51Computer network security / Directory services / Kerberos / Integrated Windows Authentication / Single sign-on / IBM AIX / Unix / Authentication / Active Directory / System software / Software / Computer security

Case Study Quest Assists RotaDyne with the Implementation of a Single, Integrated Authentication Solution Using Vintela Products RotaDyne is one of the largest manufacturers of rollers and related products for printing

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:10
52Computer network security / Directory services / Federated identity / Single sign-on / Integrated Windows Authentication / Kerberos / Active Directory / Unix / Pluggable authentication module / Software / System software / Computing

DATASHEET Authentication Services Compliance | Single Sign-on | Simplifying Identity Management Quest Authentication Services provides enterprise-wide access, authentication and authorization for Unix, Linux, and Mac sy

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:17
53Concurrent computing / Scripting languages / Tcl / Coroutine / EROS / Shell / Capability-based security / Tk / Unix / Computing / Computer programming / Software engineering

PDF Document

Add to Reading List

Source URL: www.sgo.fi

Language: English - Date: 2014-02-28 11:50:26
54System software / System administration / Password / Shadow password / Unix security / Information security / Crypt / Password strength / Password cracking / Security / Unix / Computer security

TESTBED Linux SekChek for UNIX Security Report System: Linuxwhite 9 NovemberSekChek IPS

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:31:42
55Password / Group identifier / User identifier / Shadow password / Passwd / Filesystem permissions / Unix security / Unix / System software / Software

Rating Against Industry Average X

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 04:19:14
56Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2000-09-18 13:37:46
57Internet standards / WU-FTPD / File Transfer Protocol / Compress / Computing / System software / Internet

Attacking and Securing Unix FTP Servers Jay Beale President, JJB Security Consulting Lead Developer, Bastille Linux

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:23
58Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / Configuration management / Grep / Windows Registry / Diff / Unix / Computing / System software / Software

Re-Engineering Grep and Diff for NERC CIP Gabriel A. Weaver and Sean W. Smith Rakesh B. Bobba and Edmond J. Rogers Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-06-21 17:59:04
59Software / Unix / PHP programming language / System administration / System software / Computing / Shadow password / SilverStripe / Cryptography / Password / Salt

Kentico CMS security facts Kentico CMS security facts ELSE 1

Add to Reading List

Source URL: devnet.kentico.com

Language: English - Date: 2012-04-27 07:32:41
60Computer file formats / Dynamic-link library / Filename / Library / Path / File system / Winsock / Unix security / Secure copy / Computing / System software / Software

DENICOMP SYSTEMS Winsock RCP32.DLL Copyright 2002 Denicomp Systems. All rights reserved.

Add to Reading List

Source URL: www.denicomp.com

Language: English - Date: 2003-11-30 22:26:48
UPDATE