
|
|
|
|
Home / Computers / Security / Unix / FAQs, Help, and Tutorials
|
|
|
|
Web Sites
|
- Absence of Malice - Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines.
www.lightlink.com/fors/press/ddj9603.html
- AIX 4.3 Network Hardening - Recipes to secure network services on AIX. Download of scripts available.
ist.uwaterloo.ca/security/howto/2001-01-15
- Basic Sun Security - Plain text about Solaris kernel reconfiguration, removing tcp/udp services and system daemons.
www.prometheus.com/~jeffreyb/notes/basic_security.txt
- Coping with the Threat of Computer Security Incidents - A primer from prevention through recovery by Russell L. Brand.
ftp://ftp.cerias.purdue.edu/pub/doc/guidelines/primer.txt
- FreeBSD Security How-To - Securing networking and kernel services.
people.freebsd.org/~jkb/howto.html
- NIST Computer Security Resource Clearinghouse - Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
csrc.ncsl.nist.gov
- Raw IP Networking FAQ - Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code.
www.whitefang.com/rin
- Secure Programming for Linux and Unix HOWTO - Online book on software security tips.
www.linuxdoc.org/HOWTO/Secure-Programs-HOWTO
- Secure UNIX Programming FAQ - Definitions of security holes, security principles, how to access files safely, and untainting input.
www.whitefang.com/sup
- Securing Debian HOWTO - Protecting Debian during installation and securing network services.
www.debian.org/doc/manuals/securing-debian-howto
- TPEP Frequently Asked Questions - The Computer Security Evaluation Frequently Asked Questions (V2.1)
www.radium.ncsc.mil/tpep/process/faq.html
- Unix Security - Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
www.spy.net/~jeeb/unix.html
- Unix security basics, Part 1 - Understanding file attribute bits and modes
www.itworld.com/Comp/3380/swol-1020-unix101
- Writing Safe Setuid Programs - Collection of papers on writing safe setuid programs by Matt Bishop.
seclab.cs.ucdavis.edu/~bishop/secprog.html
|
|
|
|
|