Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Unix security

Index Unix security

Unix security refers to the means of securing a Unix or Unix-like operating system. [1]

81 relations: Analogy, AppArmor, Berkeley r-commands, Buffer overflow, Chmod, Clam AntiVirus, Computer security, Cryptographic hash function, Deb (file format), Debian, Denial-of-service attack, Domain Name System, Egress filtering, Email spam, File locking, File system permissions, File Transfer Protocol, Firewall (computing), FreeBSD, Gentoo Linux, GNU Privacy Guard, Group identifier, Inetd, Internet Protocol, IP address, Ipchains, IPsec, Iptables, Key derivation function, Linux, Loopback, Ls, Man-in-the-middle attack, MD5, Message transfer agent, Morris worm, NetBSD, Netfilter, Network File System, Network interface, Network interface controller, Open-source model, OpenBSD, Operating system, Passwd, Password, Ping of death, Point-to-Point Tunneling Protocol, Port (computer networking), Pretty Good Privacy, ..., Privilege separation, Red Hat Linux, Root, Rootkit, Rpm (software), S/MIME, Samba (software), Secure Shell, Security-Enhanced Linux, Sendmail, Setuid, Simple Mail Transfer Protocol, Sticky bit, Stunnel, Su (Unix), Sudo, Superman, Superuser, System administrator, Tcpdump, Telnet, Transport Layer Security, Unix, Unix security, Unix time, Unix-like, User (computing), Virtual private network, Wheel (computing), Wireshark, Xinetd. Expand index (31 more) »

Analogy

Analogy (from Greek ἀναλογία, analogia, "proportion", from ana- "upon, according to" + logos "ratio") is a cognitive process of transferring information or meaning from a particular subject (the analog, or source) to another (the target), or a linguistic expression corresponding to such a process.

New!!: Unix security and Analogy · See more »

AppArmor

AppArmor ("Application Armor") is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per-program profiles.

New!!: Unix security and AppArmor · See more »

Berkeley r-commands

The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network.

New!!: Unix security and Berkeley r-commands · See more »

Buffer overflow

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

New!!: Unix security and Buffer overflow · See more »

Chmod

In Unix-like operating systems, is the command and system call which may change the access permissions to file system objects (files and directories).

New!!: Unix security and Chmod · See more »

Clam AntiVirus

Clam AntiVirus (ClamAV) is a free, cross-platform and open-source antivirus software toolkit able to detect many types of malicious software, including viruses.

New!!: Unix security and Clam AntiVirus · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Unix security and Computer security · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Unix security and Cryptographic hash function · See more »

Deb (file format)

deb is the format, as well as extension of the software package format for the Linux distribution Debian and its derivatives.

New!!: Unix security and Deb (file format) · See more »

Debian

Debian is a Unix-like computer operating system that is composed entirely of free software, and packaged by a group of individuals participating in the Debian Project.

New!!: Unix security and Debian · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Unix security and Denial-of-service attack · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Unix security and Domain Name System · See more »

Egress filtering

In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another.

New!!: Unix security and Egress filtering · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Unix security and Email spam · See more »

File locking

File locking is a mechanism that restricts access to a computer file by allowing only one user or process to access it in a specific time.

New!!: Unix security and File locking · See more »

File system permissions

Most file systems have methods to assign permissions or access rights to specific users and groups of users.

New!!: Unix security and File system permissions · See more »

File Transfer Protocol

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

New!!: Unix security and File Transfer Protocol · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Unix security and Firewall (computing) · See more »

FreeBSD

FreeBSD is a free and open-source Unix-like operating system descended from Research Unix via the Berkeley Software Distribution (BSD).

New!!: Unix security and FreeBSD · See more »

Gentoo Linux

Gentoo Linux (pronounced) is a Linux distribution built using the Portage package management system.

New!!: Unix security and Gentoo Linux · See more »

GNU Privacy Guard

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.

New!!: Unix security and GNU Privacy Guard · See more »

Group identifier

In Unix-like systems, multiple users can be put into groups.

New!!: Unix security and Group identifier · See more »

Inetd

inetd (internet service daemon) is a super-server daemon on many Unix systems that provides Internet services.

New!!: Unix security and Inetd · See more »

Internet Protocol

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

New!!: Unix security and Internet Protocol · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New!!: Unix security and IP address · See more »

Ipchains

Linux IP Firewalling Chains, normally called ipchains, is free software to control the packet filter or firewall capabilities in the 2.2 series of Linux kernels.

New!!: Unix security and Ipchains · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Unix security and IPsec · See more »

Iptables

iptables is a user-space utility program that allows a system administrator to configure the tables provided by the Linux kernel firewall (implemented as different Netfilter modules) and the chains and rules it stores.

New!!: Unix security and Iptables · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Unix security and Key derivation function · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Unix security and Linux · See more »

Loopback

Loopback, or loop-back, refers to the routing of electronic signals, digital data streams, or flows of items back to their source without intentional processing or modification.

New!!: Unix security and Loopback · See more »

Ls

In computing, ls is a command to list files in Unix and Unix-like operating systems.

New!!: Unix security and Ls · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Unix security and Man-in-the-middle attack · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: Unix security and MD5 · See more »

Message transfer agent

Within Internet message handling services (MHS), a message transfer agent or mail transfer agent (MTA) or mail relay is software that transfers electronic mail messages from one computer to another using a client–server application architecture.

New!!: Unix security and Message transfer agent · See more »

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet.

New!!: Unix security and Morris worm · See more »

NetBSD

NetBSD is a free and open source Unix-like operating system that descends from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Unix security and NetBSD · See more »

Netfilter

Netfilter is a framework provided by Linux that allows various networking-related operations to be implemented in the form of customized handlers.

New!!: Unix security and Netfilter · See more »

Network File System

Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a computer network much like local storage is accessed.

New!!: Unix security and Network File System · See more »

Network interface

In computing, a network interface is a system's (software and/or hardware) interface between two pieces of equipment or protocol layers in a computer network.

New!!: Unix security and Network interface · See more »

Network interface controller

A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network.

New!!: Unix security and Network interface controller · See more »

Open-source model

The open-source model is a decentralized software-development model that encourages open collaboration.

New!!: Unix security and Open-source model · See more »

OpenBSD

OpenBSD is a free and open-source Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Unix security and OpenBSD · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Unix security and Operating system · See more »

Passwd

passwd is a tool on most Unix and Unix-like operating systems used to change a user's password.

New!!: Unix security and Passwd · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Unix security and Password · See more »

Ping of death

A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer.

New!!: Unix security and Ping of death · See more »

Point-to-Point Tunneling Protocol

The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.

New!!: Unix security and Point-to-Point Tunneling Protocol · See more »

Port (computer networking)

In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.

New!!: Unix security and Port (computer networking) · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Unix security and Pretty Good Privacy · See more »

Privilege separation

In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the specific privileges they require in order to perform a specific task.

New!!: Unix security and Privilege separation · See more »

Red Hat Linux

Red Hat Linux, assembled by the company Red Hat, was a widely used Linux distribution until its discontinuation in 2004.

New!!: Unix security and Red Hat Linux · See more »

Root

In vascular plants, the root is the organ of a plant that typically lies below the surface of the soil.

New!!: Unix security and Root · See more »

Rootkit

A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: Unix security and Rootkit · See more »

Rpm (software)

RPM Package Manager (RPM) (originally Red Hat Package Manager; now a recursive acronym) is a package management system.

New!!: Unix security and Rpm (software) · See more »

S/MIME

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data.

New!!: Unix security and S/MIME · See more »

Samba (software)

Samba is a free software re-implementation of the SMB/CIFS networking protocol, and was originally developed by Andrew Tridgell.

New!!: Unix security and Samba (software) · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Unix security and Secure Shell · See more »

Security-Enhanced Linux

Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC).

New!!: Unix security and Security-Enhanced Linux · See more »

Sendmail

Sendmail is a general purpose internetwork email routing facility that supports many kinds of mail-transfer and delivery methods, including the Simple Mail Transfer Protocol (SMTP) used for email transport over the Internet.

New!!: Unix security and Sendmail · See more »

Setuid

setuid and setgid (short for "set user ID upon execution" and "set group ID upon execution", respectively) are Unix access rights flags that allow users to run an executable with the permissions of the executable's owner or group respectively and to change behaviour in directories.

New!!: Unix security and Setuid · See more »

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

New!!: Unix security and Simple Mail Transfer Protocol · See more »

Sticky bit

In computing, the sticky bit is a user ownership access right flag that can be assigned to files and directories on Unix-like systems.

New!!: Unix security and Sticky bit · See more »

Stunnel

stunnel is an open-source multi-platform application used to provide a universal TLS/SSL tunneling service.

New!!: Unix security and Stunnel · See more »

Su (Unix)

The Unix command su, sometimes described as substitute user, super user, switch user, or set user, is used by a computer user to execute commands with the privileges of another user account.

New!!: Unix security and Su (Unix) · See more »

Sudo

sudo is a program for Unix-like computer operating systems that allows users to run programs with the security privileges of another user, by default the superuser.

New!!: Unix security and Sudo · See more »

Superman

Superman is a fictional superhero appearing in American comic books published by DC Comics.

New!!: Unix security and Superman · See more »

Superuser

In computing, the superuser is a special user account used for system administration.

New!!: Unix security and Superuser · See more »

System administrator

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.

New!!: Unix security and System administrator · See more »

Tcpdump

tcpdump is a common packet analyzer that runs under the command line.

New!!: Unix security and Tcpdump · See more »

Telnet

Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

New!!: Unix security and Telnet · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Unix security and Transport Layer Security · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Unix security and Unix · See more »

Unix security

Unix security refers to the means of securing a Unix or Unix-like operating system.

New!!: Unix security and Unix security · See more »

Unix time

Unix time (also known as POSIX time or UNIX Epoch time) is a system for describing a point in time, defined as the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970,.

New!!: Unix security and Unix time · See more »

Unix-like

A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.

New!!: Unix security and Unix-like · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Unix security and User (computing) · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Unix security and Virtual private network · See more »

Wheel (computing)

In computing, the term wheel refers to a user account with a wheel bit, a system setting that provides additional special system privileges that empower a user to execute restricted commands that ordinary user accounts cannot access.

New!!: Unix security and Wheel (computing) · See more »

Wireshark

Wireshark is a free and open source packet analyzer.

New!!: Unix security and Wireshark · See more »

Xinetd

In computer networking, xinetd (extended Internet daemon) is an open-source super-server daemon, runs on many Unix-like systems and manages Internet-based connectivity.

New!!: Unix security and Xinetd · See more »

Redirects here:

Root squash, Unix Security.

References

[1] https://en.wikipedia.org/wiki/Unix_security

OutgoingIncoming
Hey! We are on Facebook now! »