Directory > Computers > Software > Operating Systems > Unix > Security > FAQs, Help, and Tutorials Quick and Dirty Home Unix Security, Part I Mandrake installation security pointers. http://unixpunx.org/modules.php?op=modload&name=News&file=article&sid=40&mode=t.... Reviews Rating: Not yet Rated
Whois Check
G A C T - Unix Passwords To get to "ROOT" you have to have somewhere to start. For the purposes of this file, that somewhere is with the 'passwd' file. http://www.geocities.com/gactnet/computers/unixpasswd.html Reviews Rating: Not yet Rated
Whois Check
Securing Debian HOWTO Protecting Debian during installation and securing network services. http://www.debian.org/doc/manuals/securing-debian-howto/ Reviews Rating: Not yet Rated
Whois Check
Unix Security Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts. http://www.spy.net/~jeeb/unix.html Reviews Rating: Not yet Rated
Whois Check
Coping with the Threat of Computer Security Incidents A primer from prevention through recovery by Russell L. Brand. ftp://ftp.cerias.purdue.edu/pub/doc/guidelines/primer.txt Reviews Rating: Not yet Rated
Whois Check
NIST Computer Security Resource Clearinghouse Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems. http://csrc.ncsl.nist.gov/ Reviews Rating: Not yet Rated
Whois Check
Secure Programming for Linux and Unix HOWTO Online book on software security tips. http://www.linuxdoc.org/HOWTO/Secure-Programs-HOWTO/ Reviews Rating: Not yet Rated
Whois Check
FreeBSD Security How-To Securing networking and kernel services. http://people.freebsd.org/~jkb/howto.html Reviews Rating: Not yet Rated
Whois Check
Secure UNIX Programming FAQ Definitions of security holes, security principles, how to access files safely, and untainting input. http://www.whitefang.com/sup Reviews Rating: Not yet Rated
Whois Check
Unix security basics, Part 1 Understanding file attribute bits and modes http://www.itworld.com/Comp/3380/swol-1020-unix101/ Reviews Rating: Not yet Rated
Whois Check
TPEP Frequently Asked Questions The Computer Security Evaluation Frequently Asked Questions (V2.1) http://www.radium.ncsc.mil/tpep/process/faq.html Reviews Rating: Not yet Rated
Whois Check
Raw IP Networking FAQ Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code. http://www.whitefang.com/rin/ Reviews Rating: Not yet Rated
Whois Check
Absence of Malice Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines. http://www.lightlink.com/fors/press/ddj9603.html Reviews Rating: Not yet Rated
Whois Check
AIX 4.3 Network Hardening Recipes to secure network services on AIX. Download of scripts available. http://ist.uwaterloo.ca/security/howto/2001-01-15/ Reviews Rating: Not yet Rated
Whois Check
Writing Safe Setuid Programs Collection of papers on writing safe setuid programs by Matt Bishop. http://seclab.cs.ucdavis.edu/~bishop/secprog.html Reviews Rating: Not yet Rated
Whois Check
|