(Page 2 of 2)   < Prev  1 2 

Category: Access Control » ACLs

Extended Attributes and ACLs for Linux
Added 2002-03-12
by Andreas Grünbacher
Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many other scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. This is an effort to implement POSIX-like Access Control Lists for Linux. Access Control Lists are built on top of Extended Attributes, which can also be used to associate other pieces of information with files such as Filesystem Capabilities, or user data like mime type and search keywords.

B1 Sample Source Code
Added 2001-10-22
by SGI
This source code provides a sample implementation of a B1 rated trusted system. This project is aimed squarely at developers interested in implementing trusted systems, the code that comprises this release will not work, it wont even compile. It is provided soley as a reference base for interested parties to investigate. The code has been extracted from the Trusted Irix product and provides an implementation of Manditory Access Control (MAC), Capabilities, Access Control Lists (ALCs), an Audit Trail and supporting networking code, such as netinet, netstat, nfs. The code comprises, kernel code, library code and application code, along with man pages and design and specification documents.

Anti Spoofing rules for cisco-boxes
Added 2001-10-22
by Jens Hektor, hektor@rz.rwth-aachen.de
A perl script to setup anti spoofing rules and some more on cisco-routers based on the routing information.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus