Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Unix (Page 6 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Overview of LIDS, Part Four
This is the fourth and final installation of a four-part series devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an overview of LIDS. The second installment looked at file restrictions, LIDS File ACLs, and LIDS enhancements of Linux capabilities. Part three discussed granting capabilities, the LIDS-specific capabilities, ACL inheritance and time-based ACLs. This segment will ex...
By: Brian Hatch 2001-11-29
http://www.securityfocus.com/infocus/1517

Overview of LIDS, Part Three
This is the third part of a four-part article devoted to the exploration of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root. The first article in this series offered an overview of LIDS. The second installment looked at file restrictions, LIDS File ACLs, and LIDS enhancements of Linux capabilities. This installment will discuss granting capabilities, the LIDS-specific capabilities, ACL inheritance and time-based ACLs.
By: Brian Hatch 2001-11-12
http://www.securityfocus.com/infocus/1510

Overview of LIDS, Part Two
This is the second part of a four-part series devoted to an overview of LIDS, a Linux kernel patch that will allow users to take away the all-powerful nature of root in order to give programs exactly the access they need and no more. The first article in this series offered an overview of LIDS. This installment will look at file restrictions, LIDS File ACLs, and LIDS enhancements of Linux capabilities.
By: Brian Hatch 2001-10-31
http://www.securityfocus.com/infocus/1502

Overview of LIDS, Part One
The Linux Intrusion Detection System (LIDS) is a Linux kernel patch that will allow users to take away the all-powerful nature of root. This article is the first part of a three-part series that will offer an overview of LIDS. This installment will offer an introduction to LIDS, including how it works, booting LIDS, sealing the kernel, and configuring LIDS.
By: Brian Hatch 2001-10-17
http://www.securityfocus.com/infocus/1496

Back to the Basics: Solaris and inetd.conf Part Two
This collection of material has been written to further clarify one of the more mystical configuration files on today's Solaris Operating System. For this example, we make use of the latest distribution of Solaris (at this time, 7). The topics covered are quite familiar to most seasoned administrators, although this publication has been written with administrators from beginning to advanced skill levels in mind. This document will focus on rpc services started via inetd.
By: Hal Flynn 2000-03-20
http://www.securityfocus.com/infocus/1491

Back to the Basics: Solaris and inetd.conf Part One
This collection of material has been written to further clarify one of the more mystical configuration files on today's Solaris Operating System. For this example, we make use of the latest distribution of Solaris (at this time, 7). The topics covered are quite familiar to most seasoned administrators, although this publication has been written with administrators from beginning to advanced skill levels in mind.
By: Hal Flynn 2000-03-20
http://www.securityfocus.com/infocus/1490

An Introduction to OpenSSL, Part Four: The SSL and TLS Protocols
This is the final installment in a four-part series on OpenSSL, a library, written in the C programming language, that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. OpenSSL also includes routines for implementing the SSL and TLS protocols. This article will provide some background on the SSL protocol and its relationship to TLS. It will also discuss TLS in depth, and show how users can use O...
By: Holt Sorenson 2001-10-03
http://www.securityfocus.com/infocus/1486

An Introduction to OpenSSL, Part Three: PKI- Public Key Infrastructure
This is the third article in a series on OpenSSL, a library written in the C programming language that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) protocol. In the first article in the series, we discussed some of the basics of cryptography. The second article showed how to use OpenSSL's openssl application to explore cryptographic basics. This article will introduce Public Key Infrastructure and show the commands that OpenSSL p...
By: Holt Sorenson 2001-09-19
http://www.securityfocus.com/infocus/1466

An Introduction to OpenSSL, Part Two: Cryptographic Functions Continued
This is the second article in a series on OpenSSL, a library written in the C programming language that provides routines for cryptographic primitives utilized in implementing the Secure Sockets Layer (SSL) protocol. In the first article in the series, we discussed some of the basics of cryptography. This article will cover acquiring and compiling OpenSSL and explore some commands that facilitate encryption and decryption.
By: Holt Sorenson 2001-09-05
http://www.securityfocus.com/infocus/1462

Installing djbdns for Name Service Part Two
By: Jeremy Rauch 2000-07-10
http://www.securityfocus.com/infocus/1439

Unix (Page 6 of 12)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus