Sites that teach users to secure Unix systems.
More information
More information
Related categories 2
Sites 7
Recipes to secure network services on AIX. Download of scripts available.
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code.
Online book on software security tips.
Definitions of security holes, security principles, how to access files safely, and untainting input.
The Computer Security Evaluation Frequently Asked Questions (V2.1)
Collection of papers on writing safe setuid programs by Matt Bishop.
Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code.
Definitions of security holes, security principles, how to access files safely, and untainting input.
The Computer Security Evaluation Frequently Asked Questions (V2.1)
Online book on software security tips.
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Collection of papers on writing safe setuid programs by Matt Bishop.
Recipes to secure network services on AIX. Download of scripts available.

Last update:
May 29, 2023 at 5:15:12 UTC

Check out
Business: Opportunities: Franchising: Franchises: Food and Drink: Coffee
- Recently edited by merlin1
- Recently edited by merlin1