UNIX System Security: A Guide for Users and System Administrators
Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.
53 pages matching workstation in this book
Results 1-3 of 53
What people are saying - Write a review
We haven't found any reviews in the usual places.
UNlX Security Stories l
File System Security
15 other sections not shown
Other editions - View all
algorithm allow anonymous FTP Athena attacker authentication available for anonymous backup Berkeley bits CERT/CC Charon checklist chmod ciphertext command Computer Security computer system configuration connection copy crypt(buf decrypt default delete described in Chapter device files dial-up electronic mail encrypted password Euripides example execute expired file system firewall home directory hosts.equiv huey implement Internet Kerberos login name machine mode modem modified monitor netgroup obtain operating system option output packet passwd password aging password file permissions plaintext procedures Protocol pw->pw_passwd remote system rhosts files root security policy security problems sendmail session key set-group-id set-user-id shadow password specified sticky bit strcmp(pw->pw_passwd Sun Microsystems SunOS super-user access system administrator System V Release tcpdump terminal ticket-granting ULTRIX UNIX security UNIX systems user id user's UUCP vendors versions of UNIX workstation worm writable