When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Stratus VOS - Wikipedia

    en.wikipedia.org/wiki/Stratus_VOS

    Devices; Hard Disks; Various IPC mechanisms; Tasks; A process is the scheduled entity in VOS, and each process has a set of attributes that govern how it is manipulated by the system. For example, processes have a user name and process name. The former is used by VOS to determine the process's access rights to external devices, and items with ...

  3. KernelCare - Wikipedia

    en.wikipedia.org/wiki/KernelCare

    KernelCare is a live kernel patching service that provides security patches and bugfixes for a range of popular Linux kernels [2] that can be installed without rebooting the system. [3] KernelCare software is a commercial product. The first beta was introduced in March 2014 and it was commercially launched in May 2014.

  4. Network Security Toolkit - Wikipedia

    en.wikipedia.org/wiki/Network_Security_Toolkit

    Network Security Toolkit (NST) is a Linux-based Live DVD/USB Flash Drive that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks.

  5. BackBox - Wikipedia

    en.wikipedia.org/wiki/BackBox

    BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. [3] It includes a complete set of tools required for ethical hacking and security testing.

  6. Advanced Intrusion Detection Environment - Wikipedia

    en.wikipedia.org/wiki/Advanced_Intrusion...

    This "snapshot" is used to build a database that is saved and may be stored on an external device for safekeeping. When the administrator wants to run an integrity test, the administrator places the previously built database in an accessible place and commands AIDE to compare the database against the real status of the system.

  7. Tiger (security software) - Wikipedia

    en.wikipedia.org/wiki/Tiger_(security_software)

    Tiger was originally developed by Douglas Lee Schales, Dave K. Hess, Khalid Warraich, and Dave R. Safford in 1992 at Texas A&M University. [1] [2] The tool was originally developed to provide a check of UNIX systems on the A&M campus that had to be accessed from off campus and, consequently, required clearance through the network security measures set in place.

  8. Linux Security Modules - Wikipedia

    en.wikipedia.org/wiki/Linux_Security_Modules

    The LSM design is described in the paper Linux Security Modules: General Security Support for the Linux Kernel [1] presented at USENIX Security 2002. [2] At the same conference was the paper Using CQUAL for Static Analysis of Authorization Hook Placement [ 3 ] which studied automatic static analysis of the kernel code to verify that all of the ...

  9. dm-crypt - Wikipedia

    en.wikipedia.org/wiki/Dm-crypt

    It appears as a block device, which can be used to back file systems, swap or as an LVM physical volume. Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process. [3]