Unix security

Results: 312



#Item
91Filesystem permissions / Ls / Microsoft Windows / Unix / Access control / SetACL / Chmod / Computing / Software / System software

Class Notes: February 16, 2006 Topic: A Case Study in UI Design and Evaluation for Computer Security Lecturer: Rob Reeder Scribe: Colleen Koranda Improving user-interface dependability through mitigation of human error

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-16 14:23:54
92Cryptography / System administration / Unix / Password / Salt / Shadow password / Crypt / Password strength / Passwd / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15217

Add to Reading List

Source URL: geodsoft.com

Language: English - Date: 2003-11-09 11:25:55
93Ls / Benn / Find

COMPUTER SCIENCE TRIPOS Part IB – 2013 – Paper 4 9 Security I (MGK) (a) While inspecting the discretionary access-control arrangements on a Unix computer, you find the following setup:

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
94Chmod / Unix / Cross-platform / Computer security / Computer-aided audit tools / Information technology audit / Job scheduling / Computing / System software / Rogue Wave Software

Rogue Wave Software Visualization for C++ Quick Start Guide

Add to Reading List

Source URL: docs.roguewave.com

Language: English - Date: 2014-09-17 11:05:51
95Unix / Malware / File system / Operating system / Computer file / Device file / Privilege / Configuration file / Setuid / Computing / System software / Computer security

Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY June 2001 Detecting Insider Threats by Monitoring System Call Activity Nam Nguyen and Peter Reiher

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-08-18 18:46:28
96Cross-platform software / World Wide Web / Apache HTTP Server / Reverse proxy / Chmod / Setuid / Chroot / Filesystem permissions / Common Gateway Interface / Software / Computing / System software

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: archive.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
97Unix / Cybersoft / Trojan horse / Internet / Operating system / Computer security / Rm / Email / Computing / Security / Computer virus

Cybersoft.com CyberSoft White Papers VFIND, CIT: TAKE ON THE BARBARIANS ON THE OTHER SIDE OF THE WALL By Roger Harmston

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
98Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.org

Language: English - Date: 2012-06-05 01:13:02
99Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.ich.org

Language: English - Date: 2012-06-04 19:13:02
100Computer network security / Access control / Software testing / Data security / Information security / Managed security service / Unix / Role-based access control / Vulnerability / Security / Computer security / Cyberwarfare

SPECIALIST PROFILE Personal Details Reference: BT2691

Add to Reading List

Source URL: www.bmeurope.com

Language: English - Date: 2013-04-26 11:30:25
UPDATE