Unix security refers to the means of securing a Unix or Unix-like operating system. A core security feature in these systems is the file system permissions...
5 KB (524 words) - 17:36, 15 April 2024
The Unix command su, which stands for 'substitute user' (or historically 'superuser'), is used by a computer user to execute commands with the privileges...
7 KB (655 words) - 09:12, 25 July 2023
IPsec (redirect from Encapsulating Security Payload)
(1996). "Problem Areas for the IP Security Protocols" (PostScript). Proceedings of the Sixth Usenix Unix Security Symposium. San Jose, CA. pp. 1–16....
44 KB (5,242 words) - 08:28, 22 October 2024
Unix System V (pronounced: "System Five") is one of the first commercial versions of the Unix operating system. It was originally developed by AT&T and...
29 KB (3,044 words) - 17:23, 20 September 2024
Md5sum (redirect from Md5sum (Unix))
error or non-malicious meddling. The md5sum program is included in most Unix-like operating systems or compatibility layers such as Cygwin. The original...
5 KB (470 words) - 00:31, 2 October 2024
File-system permissions (redirect from Unix permission)
"The How and Why of User Private Groups in Unix". security.ias.edu. Institute for Advanced Study Network Security. Archived from the original on 8 August...
21 KB (2,141 words) - 08:41, 12 October 2024
shred is a command on Unix-like operating systems that can be used to securely delete files and devices so that it is extremely difficult to recover them...
6 KB (644 words) - 00:36, 9 September 2024
and DAC) within a UNIX (more precisely, POSIX) computing environment can be attributed to the National Security Agency's Trusted UNIX (TRUSIX) Working...
29 KB (3,213 words) - 02:01, 25 July 2024
Suricata (software) (category Unix security-related software)
intrusion prevention system (IPS). It was developed by the Open Information Security Foundation (OISF). A beta version was released in December 2009, with the...
3 KB (107 words) - 18:56, 17 January 2024