• Unix security refers to the means of securing a Unix or Unix-like operating system. A core security feature in these systems is the file system permissions...
    5 KB (524 words) - 17:36, 15 April 2024
  • Md5sum (redirect from Md5sum (Unix))
    error or non-malicious meddling. The md5sum program is included in most Unix-like operating systems or compatibility layers such as Cygwin. The original...
    5 KB (469 words) - 17:47, 8 December 2023
  • The Unix command su, which stands for 'substitute user' (or historically 'superuser'), is used by a computer user to execute commands with the privileges...
    7 KB (655 words) - 09:12, 25 July 2023
  • (1996). "Problem Areas for the IP Security Protocols" (PostScript). Proceedings of the Sixth Usenix Unix Security Symposium. San Jose, CA. pp. 1–16....
    48 KB (5,079 words) - 04:34, 15 August 2024
  • SOCKS (section Security)
    defined as such in the SOCKS Protocol Version 5 RFC in 1996 or the UNIX Security Symposium III paper in 1992 but simply referred to a specific proxy...
    20 KB (2,275 words) - 18:24, 21 August 2024
  • Thumbnail for UNIX System V
    Unix System V (pronounced: "System Five") is one of the first commercial versions of the Unix operating system. It was originally developed by AT&T and...
    29 KB (3,044 words) - 09:15, 18 August 2024
  • Thumbnail for Security-Enhanced Linux
    and DAC) within a UNIX (more precisely, POSIX) computing environment can be attributed to the National Security Agency's Trusted UNIX (TRUSIX) Working...
    29 KB (3,213 words) - 02:01, 25 July 2024
  • Thumbnail for Suricata (software)
    Suricata (software) (category Unix security-related software)
    intrusion prevention system (IPS). It was developed by the Open Information Security Foundation (OISF). A beta version was released in December 2009, with the...
    3 KB (107 words) - 18:56, 17 January 2024
  • (Confining the Wily Hacker)" (PDF). Proceedings of the Sixth USENIX UNIX Security Symposium. Retrieved 25 October 2011. Geier, Eric (2012-01-16). "How...
    10 KB (1,000 words) - 22:00, 17 August 2024
  • shred is a command on Unix-like operating systems that can be used to securely delete files and devices so that it is extremely difficult to recover them...
    6 KB (642 words) - 15:20, 7 June 2023
  • "The How and Why of User Private Groups in Unix". security.ias.edu. Institute for Advanced Study Network Security. Archived from the original on 8 August...
    21 KB (2,141 words) - 11:39, 7 August 2024
  • BeyondTrust (category Unix security-related software)
    client-server computing vendor, before later acquiring a license for the UNIX security product UPM (now owned by Quest Software) and rebranding their version...
    14 KB (1,147 words) - 18:24, 5 July 2024
  • Lynis (category Unix security-related software)
    Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives. It assists...
    5 KB (482 words) - 02:29, 9 July 2024
  • Thumbnail for Unix
    Unix (/ˈjuːnɪks/ , YOO-niks; trademarked as UNIX) is a family of multitasking, multi-user computer operating systems that derive from the original AT&T...
    53 KB (5,614 words) - 06:30, 19 July 2024
  • When a text file with a shebang is used as if it were an executable in a Unix-like operating system, the program loader mechanism parses the rest of the...
    25 KB (3,229 words) - 06:56, 20 July 2024
  • became de facto standards for Unix operating systems. With wider public adoption of the Internet, their inherent security vulnerabilities became a problem...
    17 KB (1,661 words) - 06:04, 29 November 2023
  • too weak to provide any security against brute-force attacks by modern, commodity personal computers. Some versions of Unix shipped with an even weaker...
    7 KB (718 words) - 20:05, 18 August 2024
  • utility for Unix, Plan 9, Inferno, and Unix-like operating systems and beyond, the primary purpose of which is to convert and copy files. On Unix, device...
    27 KB (2,989 words) - 19:05, 29 July 2024
  • Thumbnail for Srm (Unix)
    srm (or Secure Remove) is a command line utility for Unix-like computer systems for secure file deletion. srm removes each specified file by overwriting...
    7 KB (737 words) - 13:37, 4 February 2022
  • Thumbnail for P0f
    P0f (category Unix security software)
    p0f is a passive TCP/IP stack fingerprinting tool. p0f can attempt to identify the system running on machines that send network traffic to the box it is...
    3 KB (279 words) - 16:13, 7 April 2023
  • Firewall security log According to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging...
    857 bytes (98 words) - 20:58, 29 June 2016
  • Thumbnail for Rkhunter
    Rkhunter (category Unix security-related software)
    rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of...
    3 KB (218 words) - 12:28, 4 July 2024
  • sum is a legacy utility available on some Unix and Unix-like operating systems. This utility outputs a 16-bit checksum of each argument file, as well...
    5 KB (482 words) - 09:36, 7 January 2023
  • SquidGuard (category Unix security-related software)
    sites for which access is redirected. SquidGuard must be installed on a Unix or Linux computer such as a server computer. The software's filtering extends...
    4 KB (329 words) - 16:06, 29 May 2024
  • UUCP (Unix-to-Unix Copy) is a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between...
    31 KB (4,196 words) - 21:29, 18 August 2024
  • SuEXEC (category Unix security-related software)
    Additionally, suEXEC perform a multi-step check on the executed CGI to ensure security for the server (including path-checks, a limit of permitted commands, etc...
    4 KB (336 words) - 11:54, 27 March 2023
  • Windows Services for UNIX (SFU) is a discontinued software package produced by Microsoft which provided a Unix environment on Windows NT and some of its...
    23 KB (2,376 words) - 04:26, 8 December 2023
  • Thumbnail for Passwd
    Passwd (category Unix authentication-related software)
    passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is...
    15 KB (1,934 words) - 15:30, 3 August 2024
  • Advanced Intrusion Detection Environment (category Unix security software)
    with Richard van den Berg, an independent Dutch security consultant. The project is used on many Unix-like systems as an inexpensive baseline control...
    4 KB (298 words) - 06:42, 22 September 2023
  • In Unix, Plan 9, and Unix-like operating systems, the strip program removes information from executable binary programs and object files that is not essential...
    3 KB (234 words) - 06:40, 28 April 2023