Permissions

Results: 1263



#Item
81World Wide Web / Cross-platform software / File system permissions / Chmod / Setuid / Umask / Common Gateway Interface / Chroot / Apache HTTP Server / PHP / Application server / Request Tracker

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: www.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
82Access control / Role-based access control / Ls / Zip / Email / Counterpoint / Outlook.com

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:09
83National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2016-08-05 14:35:56
84Remote desktop / Citrix Systems / Computer virus / Magnetic resonance imaging

Overview: Connecting to NGKF MRI v.4.5 • Citrix Receiver must be installed on local PC (you must have appropriate permissions on your PC to add programs, if not contact your PC IT administrator) o To download go to: ht

Add to Reading List

Source URL: www.ngkf.com

Language: English - Date: 2014-11-24 14:17:26
85Beale Air Force Base / Marysville /  California / Sacramento metropolitan area

Access Permissions Map DIRECTIONS FRIENDS OF beale

Add to Reading List

Source URL: www.bealefss.com

Language: English - Date: 2015-02-02 14:31:40
86Unix / System administration / Configuration files / File system permissions / Setuid / User identifier / Group identifier / Chmod / Sticky bit / Su / Fstab / Stat

Linux/Unix privileges from a blackhats perspective I always somehow struggled understanding fully Unix privileges. Therefore the following essay is for my own understanding and improvement (It really sticks in my brain,

Add to Reading List

Source URL: incolumitas.com

Language: English
87Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
88Smartphones / Alphabet Inc. / Android / Aosp / Google APIs

Mapping & Evolution of Android Permissions Zach Lanier & Andrew Reiter COUNTERMEASURE

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:13
89RTT / Ribbon symbolism / Alternative medicine / Oncology / Pseudoscience / Breast cancer management / Acupuncture / Treatment of cancer / Metastatic breast cancer / Breast cancer / Cancer / Evidence-based medicine

DOI:jncimonographs/lgu041 © The AuthorPublished by Oxford University Press. All rights reserved. For Permissions, please e-mail: . Clinical Practice Guidelines on the Use of

Add to Reading List

Source URL: jncimono.oxfordjournals.org

Language: English
90Brookside Museum / Saratoga County /  New York / Ballston Spa /  New York / Ballston / Brookside

PERMISSIONS FORM Brookside Museum, home of the Saratoga County Historical Society, happily shares its collections with the public by offering reproduction services. All requests for reproductions must be submitted in wri

Add to Reading List

Source URL: www.brooksidemuseum.org

Language: English - Date: 2009-10-05 11:42:49
UPDATE