HOME | MY ACCOUNT | POWER SEARCH | REGISTER | MEMBER LIST | SUGGEST CATEGORY


Web Links [Tag : Security]
Sort By :
Files lawsuit against SCO, announced today. Matthew Szulik, Red Hat Chairman, CEO, says collaborative process of open source software development which created Linux OS has been unjustly questioned, threatened. [The Inquirer]
Category:

Random Site Quote: If you can't bite, don't show your teeth - Yiddish proverb Linux is only half the story Says Microsoft peddles smut People want less wasteful data centres Extreme unlocking with AMD Overdrive Jeff Bezos goes on hard sale CPU might have a use after all Taiwanese outfit writes $215 million
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Further legal specifics on new lawsuit against SCO. [The Inquirer]
Category:

Random Site Quote: Facts are stubborn things - Smollett Linux is only half the story Says Microsoft peddles smut People want less wasteful data centres Extreme unlocking with AMD Overdrive Jeff Bezos goes on hard sale CPU might have a use after all Taiwanese outfit writes $215 million cheque Core i7 plays well
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

How to secure your Unix computer system (emphasis on HP-UX).
Category:

Random Site Quote: unix tutorials, unix security, unix help System & Network Security, HP-UX This document shows system administrators how to better secure their UNIX systems. There are no guarantees of its completeness. In addition, the author takes no responsibility if a person misuses this information. There
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

An introduction to Unix security tools, including Ten General Security Rules.
Category:

Random Site Quote: This is the home for the book, Unix System Security Tools by Seth T. Ross, from McGraw-Hill. Below are links to an excerpt from the book that includes an introduction to UNIX, an introduction to computer security, a discussion of open-source security software, ten general security rules, and a bibliography.
Unix System Security Tools This is the home for the book, by Seth T. Ross, published by McGraw-Hill. Below are links to an excerpt from the book that includes an introduction to UNIX, an introduction to computer security, a discussion of open-source security software, ten general security rules,

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
Category:

Random Site Quote: Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
Welcome to Cryptography.org The old North American Cryptography Archives are being into an international (as much as law allows) open source cryptography resource. This is because the law has changed since the reason for the existence of this site came about, and because the operator of this

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security of computer systems.
Category:

Random Site Quote: • Conferences by Name USENIX Security Symposium Check out MP3s and videos of past USENIX Security Symposia on the August 10–14, 2009, Montreal, Canada July 28–August 1, 2007, San Jose, CA August 6–10, 2007, Boston, MA July 31–August 4, 2006, Vancouver, B.C., Canada
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

27. Rscan
Tool that lets a system administrator run complex or simple scanner scripts on any number of machines in a heterogeneous environment. Unmaintained since 1995.
Category:

Random Site Quote: A long time ago, in another life, I wrote a tool called RScan to do security audits on UNIX machines, primarily on SGI IRIX machines. I even presented a on it at the USENIX LISA '95 Systems Administration conference. The lab I used to work for (The Computer Visualization Lab a Colorado State
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
Category:

Random Site Quote: This link provides a practical, concise, and comprehensive guide to all aspects of unix security. All system administrators should know this information.
Due to a lack of software and time, I was unable to produce The Guide in any form but Rich Text Format. Since then kind readers have helped me convert it to but I have also made a rather ugly text version available Thanks in part to Andrew McNaughton, an Thanks entirely to Jay D. Dyson of NASA,

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Category:

Random Site Quote: This report presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Other versions of this article: Auditing UNIX Systems: A Case Study This report presents results of a detailed security audit of UNIX systems belonging to a fictitious company. It describes discovered vulnerabilities and proposes a prioritized roadmap for addressing them. Any similarities to an

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

The Computer Security Evaluation Frequently Asked Questions (V2.1)
Category:

Random Site Quote: Computer Security Evaluation FAQ, Version 2.1 From: Trusted Product Evaluation Program Subject: Computer Security Evaluation FAQ, Version 2.1 Date: 18 Feb 1998 11:03:28 GMT X-Last-Updated: 1996/08/13 Posting-Frequency: monthly Archive-name: computer-security/evaluations The Computer Security
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Pages: [< Previous] 1 2 3 4 [Next >]


Main Category
Pagerank Statistics
PR 8
1 site(s)
PR 7
1 site(s)
PR 6
7 site(s)
PR 5
7 site(s)
PR 4
9 site(s)
PR 3
9 site(s)

Directory Statistics

Links: 698
Categories: 118


Top 10