Unix security

Results: 312



#Item
101Virtual machines / Disk file systems / File descriptor / Capability-based security / File system / Open / Hyper-V / Procfs / Root directory / System software / Software / Unix

Proper: Privileged Operations in a Virtualised System Environment Steve Muir, Larry Peterson, Marc Fiuczynski Princeton University Justin Cappos, John Hartman University of Arizona

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:19
102Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
103Hacker / Unix / Linux / At sign / Computing / Chmod / Filesystem permissions

his chapter introduces you to some of the security features of the Linux operating system. We will also cover aspects of Linux that differ from other UNIX-like operating T They Want Your Data Hackers may want your bus

Add to Reading List

Source URL: www.hackinglinuxexposed.com

Language: English - Date: 2008-12-09 14:55:29
104Sponsor / Business / System administration / USENIX / Unix

Security ’14 Sponsor and Exhibitor Information August 20-22, 2014; Manchester Grand Hyatt, San Diego www.usenix.org/conference/usenixsecurity14 The USENIX Security Symposium brings together advanced practitioners, rese

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-07-11 13:10:47
105World Wide Web / Unix / System administration / National Security Agency / Security-Enhanced Linux / Filesystem Hierarchy Standard / Red Hat / Common Gateway Interface / Server Side Includes / Computing / Software / System software

Introduction RHS429: SELinux Policy Administration For use only by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be phot

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-07-06 16:32:34
106Computer architecture / Software / Veriexec / Berkeley Software Distribution / Operating system / Unix / Cross compiler / Comparison of BSD operating systems / FTOS / Embedded operating systems / NetBSD / System software

NetBSD — Introducing NetBSD — What is the NetBSD Project? The NetBSD Project gives you a complete Unix-like operating system that is up to today’s Open Source and security standards, supporting industrystandard API

Add to Reading List

Source URL: netbsd.org

Language: English - Date: 2007-04-06 07:30:14
107Crime prevention / National security / Cloud storage / Computer network security / Computer security / Electronic commerce / Voice over IP / Data center / Computing / Concurrent computing / Distributed computing

CASE STUDY Introduction Acuity is a niche IT infrastructure consultancy, delivery and managed services provider, based in East London. Founded in 2010, the team specialise in Oracle, Unix and other midrange application s

Add to Reading List

Source URL: www.thebunker.net

Language: English - Date: 2015-02-20 06:00:36
108Internet / TCP/IP / Internet protocols / Transmission Control Protocol / Traffic flow / Internet protocol suite / Network socket / Internet Protocol / Port / Computing / Network architecture / Computer network security

A Weakness in the 4.2BSD Unix† TCP/IP Software Robert T. Morris AT&T Bell Laboratories Murray Hill, New Jersey[removed]ABSTRACT

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-15 17:33:33
109Computing / Computer virus / Configuration file / Macro virus / Unix / Computer file / Avast! / System software / Antivirus software / Software

Cybersoft.com CyberSoft White Papers Secrets of the VFind Security Tool Kit Professional Plus Version 1.00 February 2000

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
110Software / Password / User / Filesystem permissions / Spamming / Federated identity / Unix security / Features new to Windows XP / Computing / System software / Email

MANAGING USERS User management tools are found under Users inherit permissions from their Groups. You Tools, then Manage users, for simple user

Add to Reading List

Source URL: library.oneis.co.uk

Language: English
UPDATE