HOME | MY ACCOUNT | POWER SEARCH | REGISTER | MEMBER LIST | SUGGEST CATEGORY


Web Links [Tag : Unix]
Sort By :
Joint development agreement between Linux sellers SCO and SuSE protects SuSE from any legal action, SuSE says. [ZDNet UK]
Category:

Random Site Quote: An agreement with SCO Group protects Linux seller SuSE from legal action stemming from SCO's accusation that Unix software was copied into Linux,...
SuSE feels safe despite SCO legal threat Stephen Shankland, CNET News.com An agreement with SCO Group protects Linux seller SuSE from legal action stemming from SCO's accusation that Unix software was copied into Linux, SuSE said. "We have a joint development agreement with them, which includes

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

How to secure your Unix computer system (emphasis on HP-UX).
Category:

Random Site Quote: unix tutorials, unix security, unix help System & Network Security, HP-UX This document shows system administrators how to better secure their UNIX systems. There are no guarantees of its completeness. In addition, the author takes no responsibility if a person misuses this information. There
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

An introduction to Unix security tools, including Ten General Security Rules.
Category:

Random Site Quote: This is the home for the book, Unix System Security Tools by Seth T. Ross, from McGraw-Hill. Below are links to an excerpt from the book that includes an introduction to UNIX, an introduction to computer security, a discussion of open-source security software, ten general security rules, and a bibliography.
Unix System Security Tools This is the home for the book, by Seth T. Ross, published by McGraw-Hill. Below are links to an excerpt from the book that includes an introduction to UNIX, an introduction to computer security, a discussion of open-source security software, ten general security rules,

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

A portable password cracker with built-in efficient implementations of multiple password hashing algorithms found on various Unix flavors. Additionally supports Kerberos AFS and Windows NT LanMan hashes, plus many more with contributed patches. Officially supported are most Unix-like systems (including Mac OS X), Win32, DOS. There're unofficial packages for BeOS and OpenVMS.
Category:

Random Site Quote: A fast password cracker for Unix, Windows, DOS, BeOS, and OpenVMS, with support for Unix, Windows NT/2000/XP/2003, and Kerberos AFS passwords, plus more with contributed patches
bringing security into open environments John the Ripper password cracker John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
Category:

Random Site Quote: This link provides a practical, concise, and comprehensive guide to all aspects of unix security. All system administrators should know this information.
Due to a lack of software and time, I was unable to produce The Guide in any form but Rich Text Format. Since then kind readers have helped me convert it to but I have also made a rather ugly text version available Thanks in part to Andrew McNaughton, an Thanks entirely to Jay D. Dyson of NASA,

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

you have to have somewhere to start. For the purposes of this file, that somewhere is with the 'passwd' file.
Category:

Random Site Quote: PURPOSE OF CRACKING THE passwd Traditionally stated, the purpose of hacking a UNIX is: to "get to ROOT." This refers to the ROOT account that every UNIX system has as part of it's Operating system. The ROOT is a 'Trusted User' account, THE most powerful account on a UNIX. If you can hack a ROOT
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Online book on software security tips.
Category:

Random Site Quote: Secure Programming for Linux and Unix HOWTO David A. Wheeler v3.010 Edition Copyright © 1999, 2000, 2001, 2002, 2003 David A. Wheeler v3.010, 3 March 2003 This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD. Includes table of contents, errata, and sample chapter
Category:

Random Site Quote: This edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains...
Practical UNIX and Internet Security, Third Edition This edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Plain-text FAQ with newsgroup links.
Category:

Random Site Quote: Welcome to comp.unix.shell [Frequent posting] There are reader questions on this topic! X-Last-Updated: 1996/06/11 Subject: Welcome to comp.unix.shell [Frequent posting] Date: 11 May 2004 10:50:02 GMT Archive-name: unix-faq/shell/intro Version: $Id: intro,v 2.4 1995/03/28 14:14:12 tmatimar Exp
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Ksh and Csh for Win32 environments, as well as a full development environment.
Category:

Random Site Quote: Check out the newest product from MKS! MKS Toolkit for Developers, the award winning and industry-leading Windows / UNIX interoperability solution, dramatically improves the compatibility between Windows Providing a comprehensive suite of UNIX and Windows utilities MKS Toolkit for Developers
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Pages: [<< First] [< Previous] 2 3 4 5 6 7 8 9 10 11 [Next >]


Main Category
Pagerank Statistics
PR 8
1 site(s)
PR 7
1 site(s)
PR 6
7 site(s)
PR 5
7 site(s)
PR 4
9 site(s)
PR 3
9 site(s)

Directory Statistics

Links: 698
Categories: 118


Top 10