Sites that teach users to secure Unix systems.

Related categories 2

AIX 4.3 Network Hardening
Recipes to secure network services on AIX. Download of scripts available.
Auditing UNIX Systems: A Case Study
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
NIST Computer Security Resource Clearinghouse
Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
Raw IP Networking FAQ
Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code.
Secure Programming for Linux and Unix HOWTO
Online book on software security tips.
Secure UNIX Programming FAQ
Definitions of security holes, security principles, how to access files safely, and untainting input.
Securing Debian HOWTO
Protecting Debian during installation and securing network services.
TPEP Frequently Asked Questions
The Computer Security Evaluation Frequently Asked Questions (V2.1)
Unix Security
Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
Unix security basics, Part 1
Understanding file attribute bits and modes
Writing Safe Setuid Programs
Collection of papers on writing safe setuid programs by Matt Bishop.
Absence of Malice
Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines. (March 15, 1996)
[Light Bulb Mozilla]
Last update:
March 14, 2014 at 11:05:09 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business