Unix security

Results: 312



#Item
31Hacking / Software testing / Failure / Vulnerability / Setuid / File system / Exploit / File descriptor / Social vulnerability / Computer security / Unix / Cyberwarfare

Checking for Race Conditions in File Accesses Matt Bishop and Michael Dilger CSESeptember 1995 Checking for Race Conditions in File Accesses

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:49
32Computer memory / Bell–LaPadula model / Covert channel / Mandatory access control / Classified information / Htop / CPU cache / Access control / Security clearance / Security / Computer security / Computing

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
33Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
34Cross-platform software / Computer security / Computer network security / Penetration test / Software testing / KDE / BackTrack / Linux distribution / White hat / Hacking / Computing / Software

About the Course The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking professi

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:17:24
35Cross-platform software / Computer security / Code injection / Machine code / Malware / Vulnerability scanner / Nmap / National Vulnerability Database / Ping / Software / Computing / System software

Basic Web Security About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

Add to Reading List

Source URL: ton.packetlove.com

Language: English
36

Security II: Cryptography – exercises Markus Kuhn Lent 2015 – Part II Some of the exercises require the implementation of short programs. The model answers use Perl (see Part IB Unix Tools course), but you can use an

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2015-03-13 09:36:51
    37

    musings R I K FA R ROW musings Rik Farrow provides UNIX and Internet security consulting and training. He is the author of UNIX System Security and System Administrator’s Guide to System V,

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2005-05-27 17:44:09
      38

      2002 Paper 8 Question 6 Security (a) Explain the concept of a Trusted Computing Base and outline its meaning in the context of the access control provided by a typical Unix workstation. [5 marks]

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2014-06-09 10:17:49
        39

        UNIX Security: Threats and Solutions Matt Bishop Dept. of Computer Science University of California at Davis Davis, CA

        Add to Reading List

        Source URL: seclab.cs.ucdavis.edu

        Language: English - Date: 2004-06-21 18:55:46
          40

          Intruders and UNIX Security Matt Bishop Department of Computer Science University of California Davis, CAemail:

          Add to Reading List

          Source URL: seclab.cs.ucdavis.edu

          Language: English - Date: 2004-06-21 18:55:43
            UPDATE