"Important to secure the windows and unix linux servers from known shortcomings and vulnerabilities" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 13 of 50 - About 500 Essays
  • Powerful Essays

    Proxy Server

    • 2107 Words
    • 9 Pages

    Microsoft Internet Security and Acceleration (ISA) Server Author: Date: City: Martin Eisermann 2002-05-13 Bad Aibling‚ Germany Annotations: This research paper is an extract from an about 100 pages enfolding diploma thesis of Martin Eisermann‚ student at the Fachhochschule Rosenheim (University of Applied Sciences)‚ Germany. It contains the results of performance tests‚ accomplished with MS Proxy Server 2.0‚ MS ISA Server and Linux Squid Proxy. This work reflects the personal impressions

    Premium Microsoft Windows Operating system Windows 2000

    • 2107 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Unix Network Programing

    • 5507 Words
    • 23 Pages

    UNIX UNIX Network Programming with TCP/IP Short Course Notes Alan Dix © 1996 Network Programming with TCP/IP UNIX Network Programming with TCP/IP UNIX Network Programming with TCP/IP UNIX UNIX Network Programming with TCP/IP Network Programming with TCP/IP http://www.hiraeth.com/alan/tutorials UNIX Network Programming with TCP/IP Course Outline Alan Dix http://www.hcibook.com/alan Session 1 Session 2 Session 3 Internet Basics First Code Standard Applications

    Premium IP address Transmission Control Protocol Internet Protocol

    • 5507 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Comparison of Vulnerability Assessments and Penetration Testing Abstract: Internet has opened unlimited avenues of opportunity by enabling organizations to conduct business and share information on a global basis. However‚ it has also brought new levels of security concerns and Cyber threats. It exposes valuable corporate information‚ mission critical business applications and consumer’s private information to more risk than before. But security of IT infrastructure is something that Organizations

    Premium Internet Computer security Security

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Assignment 1 Threat: An unauthorized employee tries to access data that is hosted on the server. Vulnerability: The organization does not use authentication and access controls. Likelihood: The likelihood is very low‚ depending on the organization and its budget. For the most part‚ most organizations have IT specialists that are tasked to keep everything on the network secure. In the government most all data is protected by multiple forms of security. LAN DOMAIN: Weak passwords could be

    Premium Computer virus Malware Authentication

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    linux unit1 assignment1

    • 825 Words
    • 3 Pages

    cannot restrict people from redistributing/modifying/using the software‚ and users must be allowed to redistribute modified versions under the same terms/licensing. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? Answer: GNU stands for "GNU’S Not Unix"‚ and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating

    Premium Unix User Operating system

    • 825 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Linux Command Line

    • 50399 Words
    • 202 Pages

    1 Linux Command Line This Course will provide the basic tools‚ skills and practice to begin the process of learning Linux from the command line. Written By Mike Weber Notes: Copyright by CyberMontana Inc. Cannot be reproduced without written permission. Box 1262 Trout Creek‚ MT 59874 2 Working Lab Manual This book is designed to be a working manual‚  a book you can write notes in‚ underline and use as a  reference for a long time.  The manual is loaded with Labs to learn and practice skills that you are 

    Premium File system User

    • 50399 Words
    • 202 Pages
    Satisfactory Essays
  • Powerful Essays

    Unix Hater's book

    • 35149 Words
    • 141 Pages

    UNIXHATERS Handbook The UNIX- HATERS Handbook “Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence.” ® IDG BOOKS Edited by Simson Garfinkel‚ Daniel Weise‚ and Steven Strassmann PROGRAMMERS Illustrations by John Klossner P R E S S iv IDG Books Worldwide‚ Inc. An International Data Group Company San Mateo‚ California • Indianapolis‚ Indiana • Boston‚ Massachusetts The UNIX-HATERS Handbook Published by

    Premium Unix Sun Microsystems

    • 35149 Words
    • 141 Pages
    Powerful Essays
  • Powerful Essays

    Linux Security Technologies John Pierce SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country‚ it should be very apparent why an organization like NSA had such an interest in heading up development of a more

    Premium Fedora File system Access control

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    UNIX and Linux File Management Systems A computer file management system is simply a data structure or a collection of files. It organizes data on a disk into files and directories and gives each file a name‚ which must be unique in each directory. More advanced file systems have facilities to recover data from system crashes. File management systems utilize disks which have raw partitions. Some database applications prefer raw disks‚ but most end users and applications require a file system

    Premium File system

    • 1312 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Abstract Vulnerability literally means to be exposed physically or mentally. It is basically uncertainty‚ insecurity‚ and risk. In day to day life‚ people tend to drive away from situations that might expose their emotional or physical weaknesses by perfecting themselves. But life is not all black and white. It is a series of ups and downs‚ good and bad. The reason people avoid risk and uncertainty is scarcity. The fear of never being good‚ perfect‚ beautiful‚ secure‚ rich‚ secure enough. When people

    Premium Risk Hazard Vulnerability

    • 1592 Words
    • 7 Pages
    Powerful Essays
Page 1 10 11 12 13 14 15 16 17 50