Unix security

Results: 312



#Item
241Unix / Public computer / Library / Computer security / Computing / Computer terminal

COMPUTER USE POLICY • 60 minute time limit and 15 minute time limit computers are available for public use. SIGN IN WITH STAFF prior to using. • Must be 18 or older unless approved by library staff. • First priorit

Add to Reading List

Source URL: www.lawlibrary.org

Language: English - Date: 2011-09-15 19:55:15
242Internet protocols / Internet standards / Unix / System administration / Network File System / Secure Shell / Shadow password / Password / Unix security / System software / Computing / Software

Murphy’s law and computer security Wietse Venema Mathematics and Computing Science Eindhoven University of Technology The Netherlands [removed]

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2007-09-28 05:27:00
243Cross-platform software / AppArmor / Unix / Mandatory access control / Ubuntu / Sandbox / Mmap / Debian / Man page / Software / Computing / System software

Package ‘RAppArmor’ July 2, 2014 Type Package Title Interfaces to Linux and AppArmor security methods. Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 10:16:11
244Computer security / Firewall / Transmission Control Protocol / Traffic flow / Router / Unix security / Network address translation / Stateful firewall / Computing / Computer network security / System software

Network (In)Security Through IP Packet Filtering D. Brent Chapman Great Circle Associates [removed] +[removed]1057 West Dana Street

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-11 22:53:33
245Chmod / Filesystem permissions / Computer file / Privilege / Configure script / Rm / Unix security / File system / Computing / Software / Unix

NORMALIZE SCRIPT - SETUP INSTRUCTIONS INSTRUCTIONS Group directory owners will need to create a text (.txt) file using Notepad (Windows) or TextEdit (Mac). The file does not require data but should be labeled as one of t

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2012-10-24 17:13:31
246Data security / Information security / National security / Public safety / Prevention / Security / Computer security / Crime prevention

UNIVERSITY OF ALASKA ADMINISTRATIVE ACCESS STATEMENT/RULES RESET FORM (Unix, Oracle, Banner, & EDIR)

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2014-04-09 19:15:49
247Data security / Information security / National security / Public safety / Prevention / Security / Computer security / Crime prevention

UNIVERSITY OF ALASKA ADMINISTRATIVE ACCESS STATEMENT/RULES RESET FORM (Unix, Oracle, Banner, & EDIR)

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-04-09 19:15:49
248System administrator / Security / Cryptography / Unix / System administration / Password policy / Privileged password management / Computing / Password / User

Microsoft Word - SB1167 Self Registration Letter Closers - final.doc

Add to Reading List

Source URL: www.idfpr.com

Language: English - Date: 2008-05-16 10:42:00
249Password / Login / Network security / Transaction authentication number / Unix / Identity management systems / System administration / Password policy / Password strength / Security / Access control / Computer security

Help For assistance with logging on to the network, contact your lab tech or instructor first. The problem may need to be resolved by calling the Help Desk at Ext[removed]HELP),

Add to Reading List

Source URL: www.chipola.edu

Language: English - Date: 2014-09-02 09:59:54
250System administrator / Security / Cryptography / Unix / System administration / Password policy / Privileged password management / Computing / Password / User

Microsoft Word - SB1167 Registration Letter Banks - final.doc

Add to Reading List

Source URL: www.idfpr.com

Language: English - Date: 2008-05-16 10:42:00
UPDATE