Unix security

Results: 312



#Item
71

PDF Document

Add to Reading List

Source URL: download.nusoft.com.tw

Language: English - Date: 2012-02-24 01:31:22
72

"Crack Version 4.1" A Sensible Password Checker for Unix Alec D.E. Muffett Unix Software Engineer Aberystwyth, Wales, UK ( or )

Add to Reading List

Source URL: www.crypticide.com

Language: English - Date: 2004-08-23 05:36:41
73Securing Apache on Unix/Linux  Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Securing Apache on Unix/Linux Apache security books reviewed at http://www.apachetutor.org/security/ (and a bunch of FAQs)

Add to Reading List

Source URL: archive.apachecon.com

Language: English - Date: 2011-09-21 13:50:22
74Providing 25 Years of Virus Protection  Made in the USA www.cybersoft.com  Capability Statement

Providing 25 Years of Virus Protection Made in the USA www.cybersoft.com Capability Statement

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2015-02-19 15:49:39
75Cybersoft.com  CyberSoft White Papers Secrets of the VFind Security Tool Kit Professional Plus  Version 1.00 February 2000

Cybersoft.com CyberSoft White Papers Secrets of the VFind Security Tool Kit Professional Plus Version 1.00 February 2000

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
76Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x – Version 6.x July 2011 NCBPSA5200-05

Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x – Version 6.x July 2011 NCBPSA5200-05

Add to Reading List

Source URL: logmatrix.com

Language: English - Date: 2014-05-20 18:13:50
77PROTECTING AGAINST THE SHELLSHOCK BASH VULNERABILITY, WITH SENTRIX Technical Brief What is Bash? Bash is a command-line shell similar to the Windows cmd.exe. It is one of the most

PROTECTING AGAINST THE SHELLSHOCK BASH VULNERABILITY, WITH SENTRIX Technical Brief What is Bash? Bash is a command-line shell similar to the Windows cmd.exe. It is one of the most

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2014-10-03 03:49:12
78SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:33
79Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2007-08-17 11:07:47
80Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller  Stephanie Jones

Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller Stephanie Jones

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49