File system permissions

Results: 81



#Item
71Unix / Windows NT architecture / Network file systems / Chmod / Unix security / Filesystem permissions / Access control list / File system / Security descriptor / Computing / System software / Software

White Paper EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL Abstract

Add to Reading List

Source URL: www.emc.com

Language: English
72Software / Filesystem permissions / Setuid / Shebang / File system / Computer file / Rm / Cp / Open / Unix / Computing / System software

Filesystem.fm Page 153 Tuesday, September 6, [removed]:59 PM The setuid and setgid bits 153

Add to Reading List

Source URL: www.admin.com

Language: English - Date: 2013-02-01 20:01:41
73Computer file formats / Names / Archive formats / Microsoft Windows / ASP.NET / Microsoft Visual Studio / Filename / Filesystem permissions / Windows Explorer / Software / Computing / System software

Website: www.chestysoft.com Email: [removed] csFileDownload[removed]ASP File Download Component This component allows file downloads to be controlled from within an ASP script. This is useful for

Add to Reading List

Source URL: www.chestysoft.com

Language: English - Date: 2013-10-25 11:32:17
74Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
75Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
76Software / User identifier / Password / Filesystem permissions / File system / Rm / Computer file / Group identifier / Privilege / Unix / Computing / System software

system and offers a number of hints on how to improve security. The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes. (Ac

Add to Reading List

Source URL: wolfram.schneider.org

Language: English - Date: 2012-01-08 15:19:27
77Program Files / Computer file / Filesystem permissions / Windows XP / Windows Vista / Features new to Windows XP / Windows Explorer / Microsoft Windows / System software / Computing

WitsEnds Software – ChekScan Windows 7 permissions for Chekscan (and ChekScan Lite – CSLite) November 29, 2012 To Summarize : Windows 7 has security issues to address that XP mostly does not. Once ChekScan is install

Add to Reading List

Source URL: www.witsends.com

Language: English - Date: 2012-12-04 18:06:11
78Character encoding / JBASE / Filename / Umask / Unix / Dd / Filesystem permissions / Computer file / Path / Computing / System software / Software

Installation Advisory for jBASE Installation Guides

Add to Reading List

Source URL: www.jbase.com

Language: English - Date: 2008-09-22 07:15:24
79Network file systems / Chroot / Sandbox / File system / Filesystem Hierarchy Standard / Network File System / Virtual file system / Access control list / Filesystem permissions / System software / Software / Computing

Sandboxing Applications Diomidis Spinellis [removed]

Add to Reading List

Source URL: www.dmst.aueb.gr

Language: English - Date: 2008-07-02 11:41:31
80Software / Unix security / Filesystem permissions / File system / Rm / Computer file / Privilege / Password / Group identifier / Unix / Computing / System software

PDF Document

Add to Reading List

Source URL: www.tom-yam.or.jp

Language: English - Date: 2003-04-02 18:48:42
UPDATE