Unix security

Results: 312



#Item
61Disk encryption / Inode / Unix / Cryptographic software / HTTP cookie / Cross-site scripting / JavaScript / BitLocker Drive Encryption / Ln / Computing / Computer security / Software

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
62Unix / OpenSSH / Secure Shell / Filesystem Hierarchy Standard / Rlogin / Chroot / Ssh-keygen / Inetd / Shadow password / System software / Software / Computing

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2000-09-18 13:37:46
63Software / User identifier / Group identifier / Process identifier / Fork / Privilege / Id / Kill / Exit / Process / Computing / System software

A Short Course On Systems Administration and Security Under Unix by Dr. Frederick B. Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2010-12-06 01:12:56
64Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: ldp.pakuni.net

Language: English - Date: 2008-06-06 09:26:05
65Internet / Network architecture / Internet standards / Data security / Unix / Inetd / Firewall / Rlogin / Filesystem Hierarchy Standard / Computing / Computer network security / Internet protocols

Public/Private/Wireless Information Security A blue print for safeguarding sensitive information Mark Rader and Professor J. D. Birdwell Laboratory for Information Technologies 439 Science & Engineering Research Facility

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:12
66Software engineering / Address space layout randomization / Grsecurity / PaX / Procfs / Ptrace / Pointer / ALGOL 68 / Computing / Computer programming / Unix

Linux ASLR Curiosities Tavis Ormandy Julien Tinnes Google Security Team ASLR

Add to Reading List

Source URL: www.cr0.org

Language: English - Date: 2009-04-22 19:17:58
67Computing / System administration / Internet protocols / Internet standards / Unix security / Shadow password / Password / Passwd / Su / System software / Unix / Software

TESTBED Linux SekChek for UNIX Security Report System: Linuxwhite 9 November 2013

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-09 10:37:19
68Unix / National Security Agency / Security-Enhanced Linux / Computer file / Filesystem permissions / File system / Chmod / Kernel / Unix security / Computing / System software / Computer security

PinUP: Pinning User Files to Known Applications William Enck, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Laboratory Department of Computer Science and Engineering, The Pennsylv

Add to Reading List

Source URL: www.enck.org

Language: English
69Computer network security / Directory services / Active Directory / Windows / Kerberos / Privilege / Authentication / Unix / Authorization / System software / Software / Computer security

PDF Document

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:27
70Chroot / Kernel / Capability-based security / Operating system / Unix / Privilege escalation / Microkernel / User identifier / Principle of least privilege / System software / Computer security / Software

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
UPDATE