HOME | MY ACCOUNT | POWER SEARCH | REGISTER | MEMBER LIST | SUGGEST CATEGORY



Top > Security > FAQs, Help, and Tutorials

FAQs, Help, and Tutorials

Sort By :
Recipes to secure network services on AIX. Download of scripts available.
Category:

Random Site Quote: Apache/2.2.6 (Unix) mod_ssl/2.2.6 OpenSSL/0.9.7d PHP/5.2.4 mod_perl/2.0.2 Perl/v5.8.8 Server at ist.uwaterloo.ca Port 80 Tongue in cheek comments on safe computing practices. From . Volume 5, Number 5, May 2008. Applications can always be reinstalled, but your data is the most important thing on
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines.
Category:

Random Site Quote: Apache/1.3.28 Server at Port 80 The following editorial is from © 1996 by Miller Freeman, Inc. All rights reserved. From time to time, all of us end up doing the wrong thing for the right reason. Of course, sometimes we do the right thing for the wrong reason, or even the wrong thing for
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
Category:

Random Site Quote: This is the NIST.gov Computer Security Division and CSRC website. The Computer Security Division is involved with many different projects. CSRC also provides many webpages based on these projects. To learn more about the work we do, visit our website.
NIST, Computer Security Division, Computer Security Resource Center To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. To learn more, NOTE: The survey has been taken off-line so it can be updated.. [May 15, 2009] --

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

A primer from prevention through recovery by Russell L. Brand.
Category:

Random Site Quote: Coping with the Threat of Computer Security Incidents A Primer from Prevention through Recovery As computer security becomes a more important issue in modern society, it begins to warrant a systematic approach. The vast majority of the computer security problems and the costs associated with
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
Category:

Random Site Quote: This link provides a practical, concise, and comprehensive guide to all aspects of unix security. All system administrators should know this information.
Due to a lack of software and time, I was unable to produce The Guide in any form but Rich Text Format. Since then kind readers have helped me convert it to but I have also made a rather ugly text version available Thanks in part to Andrew McNaughton, an Thanks entirely to Jay D. Dyson of NASA,

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Protecting Debian during installation and securing network services.
Category:

Random Site Quote: Chroot environment for SSH " Chroot environment for Apache " /etc/services help secure my box?" proftpd is vulnerable to a Denial of Service attack." portsentry , there are a lot of ports open." testing get security updates?" This document describes security in the Debian project and in the
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

you have to have somewhere to start. For the purposes of this file, that somewhere is with the 'passwd' file.
Category:

Random Site Quote: PURPOSE OF CRACKING THE passwd Traditionally stated, the purpose of hacking a UNIX is: to "get to ROOT." This refers to the ROOT account that every UNIX system has as part of it's Operating system. The ROOT is a 'Trusted User' account, THE most powerful account on a UNIX. If you can hack a ROOT
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Solaris system administration FAQs, articles and tips.
Category:

Random Site Quote: Solaris security related issues , tips and tricks explained
Solaris security broadly falls under two groups - one is where the system is accessible using local area network/vlan and it has to be secured against unauthorized access. Second is system is accessible over the Internet to a number of persons and it has to be protected against unauthorized

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Details some of the focus areas for security and provides suggestions to make it strong.
Category:

Random Site Quote: Solaris security related issues , tips and tricks explained
Summary of changes with links to patches and information. , best practices and implementation of application monitoring is quick reference to commonly used unix commands . : Quick reference to setting up network in Solaris performance monitoring tools with example and Reference to setting up

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Collection of papers on writing safe setuid programs by Matt Bishop.
Category:

Random Site Quote: Center for Information Protection UC Davis is planning to join the NSF I/UCRC Center for Information Protection. We are looking for companies to join our Industrial Advisory Conferences and Workshops Writing Safe Setuid Programs Writing safe privileged programs (defined as programs that run
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR


Pages: 1 2 [Next >]

Category Jump :
Popular Tags


Main Category
Pagerank Statistics
PR 8
1 site(s)
PR 7
1 site(s)
PR 6
7 site(s)
PR 5
7 site(s)
PR 4
9 site(s)
PR 3
9 site(s)

Directory Statistics

Links: 698
Categories: 118


Top 10