Unix security

Results: 312



#Item
1

DATASHEET The Privileged Access Suite for UNIX Simplify UNIX security and administration and meet compliance requirements

Add to Reading List

Source URL: www.oneidentity.com

Language: English - Date: 2017-06-18 23:17:16
    2

    The Misuse of Android Unix Domain Sockets and Security Implications Yuru Shao† , Jason Ott∗ , Yunhan Jack Jia† , Zhiyun Qian∗ , Z. Morley Mao† † University of Michigan, ∗ University of California, Riversid

    Add to Reading List

    Source URL: www.cs.ucr.edu

    Language: English - Date: 2016-10-31 00:33:07
      3

      system and offers a number of hints on how to improve security. The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes. (Ac

      Add to Reading List

      Source URL: wolfram.schneider.org

      - Date: 2012-01-08 15:19:27
        4

        The Misuse of Android Unix Domain Sockets and Security Implications Yuru Shao† , Jason Ott∗ , Yunhan Jack Jia† , Zhiyun Qian∗ , Z. Morley Mao† † University of Michigan, ∗ University of California, Riversid

        Add to Reading List

        Source URL: web.eecs.umich.edu

        - Date: 2016-10-10 16:39:32
          5

          To appear in Proceedings of the Third Usenix UNIX Security Sympisum, Baltimore, SeptemberThere Be Dragons Steven M. Bellovin AT&T Bell Laboratories Murray Hill, NJ

          Add to Reading List

          Source URL: www.avolio.com

          - Date: 2007-12-29 17:42:40
            6

            Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

            Add to Reading List

            Source URL: www.apachecon.com

            - Date: 2011-09-21 13:50:22
              7Computing / Software / Internet security / Software bugs / Shellshock / Bash / Kyocera / Vulnerability / Operating system / Linux

              GNU Bash "Shellshock" Security Vulnerability December 5, 2014 A critical security vulnerability has been reported in the GNU Bash "Shellshock", which is a common command line used in many Linux/UNIX operating systems. TA

              Add to Reading List

              Source URL: www.triumph-adler.de

              Language: English - Date: 2014-12-15 03:12:29
              8System administration / Unix / USENIX / Computing / Large Installation System Administration Conference / LISA / Computer science / Information technology / Niels Provos / USENIX Annual Technical Conference

              UPCOMING EVENTS USENIX Security ’16: 25th USENIX Security Symposium August 10–12, 2016, Austin, TX, USA www.usenix.org/sec16 LISA16

              Add to Reading List

              Source URL: www.usenix.org

              Language: English - Date: 2016-07-15 19:30:00
              9Unix / Computing / Software / System software / Digital media / Research / System administration / USENIX / Cyber-physical system / Electronic submission / Computer security

              Announcement and Call for Papers 4th Workshop on Cyber Security Experimentation and Test (CSET ’11) Sponsored by USENIX, the Advanced Computing Systems Association http://www.usenix.org/cset11

              Add to Reading List

              Source URL: static.usenix.org

              Language: English - Date: 2011-04-25 15:59:03
              10Unix / System administration / USENIX / Computing / Computer science

              20 USENIX SECURITY SYMPOSIUM th San Francisco, CA • August 8–12, 2011 Join us for a 5-day tutorial and refereed technical program for researchers, practitioners,

              Add to Reading List

              Source URL: static.usenix.org

              Language: English - Date: 2011-07-14 18:10:46
              UPDATE