Arts
Business
Computers
Games
Health
Home
Kids and Teens
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports

   Home / Computers / Security / Unix / FAQs, Help, and Tutorials
 
   Web Sites
  • Absence of Malice - Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines.
    www.lightlink.com/fors/press/ddj9603.html
  • AIX 4.3 Network Hardening - Recipes to secure network services on AIX. Download of scripts available.
    ist.uwaterloo.ca/security/howto/2001-01-15
  • Basic Sun Security - Plain text about Solaris kernel reconfiguration, removing tcp/udp services and system daemons.
    www.prometheus.com/~jeffreyb/notes/basic_security.txt
  • Coping with the Threat of Computer Security Incidents - A primer from prevention through recovery by Russell L. Brand.
    ftp://ftp.cerias.purdue.edu/pub/doc/guidelines/primer.txt
  • FreeBSD Security How-To - Securing networking and kernel services.
    people.freebsd.org/~jkb/howto.html
  • NIST Computer Security Resource Clearinghouse - Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
    csrc.ncsl.nist.gov
  • Raw IP Networking FAQ - Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code.
    www.whitefang.com/rin
  • Secure Programming for Linux and Unix HOWTO - Online book on software security tips.
    www.linuxdoc.org/HOWTO/Secure-Programs-HOWTO
  • Secure UNIX Programming FAQ - Definitions of security holes, security principles, how to access files safely, and untainting input.
    www.whitefang.com/sup
  • Securing Debian HOWTO - Protecting Debian during installation and securing network services.
    www.debian.org/doc/manuals/securing-debian-howto
  • TPEP Frequently Asked Questions - The Computer Security Evaluation Frequently Asked Questions (V2.1)
    www.radium.ncsc.mil/tpep/process/faq.html
  • Unix Security - Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
    www.spy.net/~jeeb/unix.html
  • Unix security basics, Part 1 - Understanding file attribute bits and modes
    www.itworld.com/Comp/3380/swol-1020-unix101
  • Writing Safe Setuid Programs - Collection of papers on writing safe setuid programs by Matt Bishop.
    seclab.cs.ucdavis.edu/~bishop/secprog.html

Google
1995-2015 © Stunning, Inc.