Web Directory

  FAQs, Help, and Tutorials (16)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

Regular Websites in this category

TPEP Frequently Asked Questions Open in a new windowLink Details
- The Computer Security Evaluation Frequently Asked Questions (V2.1)
- http://www.faqs.org/faqs/computer-security/evaluations/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Raw IP Networking FAQ Open in a new windowLink Details
- Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code.
- http://www.faqs.org/faqs/internet/tcp-ip/raw-ip-faq/index.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Secure UNIX Programming FAQ Open in a new windowLink Details
- Definitions of security holes, security principles, how to access files safely, and untainting input.
- http://www.faqs.org/faqs/unix-faq/programmer/secure-programming/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
FreeBSD Handbook Security chapter Open in a new windowLink Details
- Securing FreeBSD
- http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/securing-freebsd.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Secure Programming for Linux and Unix HOWTO Open in a new windowLink Details
- Online book on software security tips.
- http://en.tldp.org/HOWTO/Secure-Programs-HOWTO/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Auditing UNIX Systems: A Case Study Open in a new windowLink Details
- This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
- http://www.zeltser.com/auditing-unix-systems/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Writing Safe Setuid Programs Open in a new windowLink Details
- Collection of papers on writing safe setuid programs by Matt Bishop.
- http://nob.cs.ucdavis.edu/~bishop/secprog/index.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Adminschoice - Securing solaris OS Open in a new windowLink Details
- Details some of the focus areas for security and provides suggestions to make it strong.
- http://adminschoice.com/docs/securing_solaris.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Admin's Choice - Resources for Unix administrators Open in a new windowLink Details
- Solaris system administration FAQs, articles and tips.
- http://www.adminschoice.com/docs/P_securing_solaris.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Securing Debian HOWTO Open in a new windowLink Details
- Protecting Debian during installation and securing network services.
- http://www.debian.org/doc/manuals/securing-debian-howto/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Unix Security Open in a new windowLink Details
- Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
- http://www.spy.net/~jeeb/unix.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Coping with the Threat of Computer Security Incidents Open in a new windowLink Details
- A primer from prevention through recovery by Russell L. Brand.
- ftp://ftp.cerias.purdue.edu/pub/doc/guidelines/primer.txt

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
NIST Computer Security Resource Clearinghouse Open in a new windowLink Details
- Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
- http://csrc.ncsl.nist.gov/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Unix security basics, Part 1 Open in a new windowLink Details
- Understanding file attribute bits and modes
- http://www.itworld.com/Comp/3380/swol-1020-unix101/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Absence of Malice Open in a new windowLink Details
- Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines.
- http://www.lightlink.com/fors/press/ddj9603.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
AIX 4.3 Network Hardening Open in a new windowLink Details
- Recipes to secure network services on AIX. Download of scripts available.
- http://ist.uwaterloo.ca/security/howto/2001-01-15/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]