Home |
FAQs, Help, and Tutorials (14) Sites:
» AIX 4.3 Network Hardening
Recipes to secure network services on AIX. Download of scripts available. http://ist.uwaterloo.ca/security/howto/2001-01-15/ » Absence of Malice
Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines. http://www.lightlink.com/fors/press/ddj9603.html » Admin's Choice - Resources for Unix administrators
Solaris system administration FAQs, articles and tips. http://www.adminschoice.com/docs/P_securing_solaris.htm » Adminschoice - Securing solaris OS
Details some of the focus areas for security and provides suggestions to make it strong. http://adminschoice.com/docs/securing_solaris.htm » Auditing UNIX Systems: A Case Study
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination. http://www.zeltser.com/auditing-unix-systems/ » Coping with the Threat of Computer Security Incidents
A primer from prevention through recovery by Russell L. Brand. ftp://ftp.cerias.purdue.edu/pub/doc/guidelines/primer.txt » FreeBSD Handbook Security chapter
Securing FreeBSD http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/securing-freebsd.html » NIST Computer Security Resource Clearinghouse
Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems. http://csrc.ncsl.nist.gov » Secure Programming for Linux and Unix HOWTO
Online book on software security tips. http://en.tldp.org/HOWTO/Secure-Programs-HOWTO/ » Securing Debian HOWTO
Protecting Debian during installation and securing network services. http://www.debian.org/doc/manuals/securing-debian-howto/ » TPEP Frequently Asked Questions
The Computer Security Evaluation Frequently Asked Questions (V2.1) http://www.faqs.org/faqs/computer-security/evaluations/ » Unix Security
Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts. http://www.spy.net/~jeeb/unix.html » Unix security basics, Part 1
Understanding file attribute bits and modes http://www.itworld.com/swol-1020-unix101 » Writing Safe Setuid Programs
Collection of papers on writing safe setuid programs by Matt Bishop. http://nob.cs.ucdavis.edu/~bishop/secprog/index.html This category needs an editor
Last Updated: 2007-01-02 19:56:46
The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com |