Operating Systems
- 1441
- TPEP Frequently Asked Questions
- The Computer Security Evaluation Frequently Asked Questions (V2.1)
- 1442
- Unix Security
- Paper by Rajib K. Mitra about file permissions, daemons, stack overflows and scripts.
- 1444
- Writing Safe Setuid Programs
- Collection of papers on writing safe setuid programs by Matt Bishop.
- 1445
- Cyber Security and Information Infrastructure Protection
- Practical measures for critical infrastructure protection, intrusion prevention and threat assessment.
- 1449
- Guarded Memory Move (GMM)
- The GMM library can be used to prevent and study buffer overflows exploits
- 1450
- Samhain
- A tool for file integrity checking that optionally can be used as a client/server application for centralized monitoring of networked hosts.
- 1451
- GNU BASH
- Official site for the GNU Bourne Again SHell. Includes manual and links to download bash binaries and source.
- 1454
- Bash Reference Manual
- GNU BASH shell reference manual. Readable online or optionally download in a variety of formats.
- 1455
- Command Line Warriors
- An open site about command-line computing using Bash and other GNU/Linux/BSD/Unix shells.
