Unix security

Results: 312



#Item
71Security / Md5sum / Firmware / Checksum / Authentication / Cksum / Computing / MD5 / Unix

PDF Document

Add to Reading List

Source URL: download.nusoft.com.tw

Language: English - Date: 2012-02-24 01:31:22
72System administration / Unix / Crack / Password cracking / Password / Shadow password / Crypt / Passwd / Unix security / System software / Software / Computer security

"Crack Version 4.1" A Sensible Password Checker for Unix Alec D.E. Muffett Unix Software Engineer Aberystwyth, Wales, UK ( or )

Add to Reading List

Source URL: www.crypticide.com

Language: English - Date: 2004-08-23 05:36:41
73Cross-platform software / World Wide Web / Apache HTTP Server / Reverse proxy / Chmod / Setuid / Chroot / Filesystem permissions / Common Gateway Interface / Software / Computing / System software

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: archive.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
74Computer security / Malware / Computer virus / Spyware / Unix / Avira / Linux malware / BitDefender / Antivirus software / System software / Software

Providing 25 Years of Virus Protection Made in the USA www.cybersoft.com Capability Statement

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2015-02-19 15:49:39
75Computing / Computer virus / Configuration file / Macro virus / Unix / Computer file / Avast! / System software / Antivirus software / Software

Cybersoft.com CyberSoft White Papers Secrets of the VFind Security Tool Kit Professional Plus Version 1.00 February 2000

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
76Windows NT / Windows Server / Unix / Windows Registry / Active Directory / Windows Vista / Server / System software / Software / Microsoft Windows

Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x – Version 6.x July 2011 NCBPSA5200-05

Add to Reading List

Source URL: logmatrix.com

Language: English - Date: 2014-05-20 18:13:50
77Unix shells / Cross-platform software / Computer network security / Hacking / Zero-day attack / Vulnerability / Bash / Secure Shell / Exploit / Software / Computing / Scripting languages

PROTECTING AGAINST THE SHELLSHOCK BASH VULNERABILITY, WITH SENTRIX Technical Brief What is Bash? Bash is a command-line shell similar to the Windows cmd.exe. It is one of the most

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2014-10-03 03:49:12
78Access control / Access control list / Unix / Filesystem permissions / Mandatory access control / Role-based access control / Grsecurity / Access Control Matrix / Type enforcement / Computer security / Security / System software

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:33
79Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
80Computer architecture / Distributed file system / Capability-based security / File system / Ceph / Object storage device / Unix / File descriptor / Lustre / Network file systems / Computing / System software

Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller Stephanie Jones

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49
UPDATE