×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [shadow file]
Home >
shadow file
Ethical Hacking n VAPT presentation by Suvrat jain
1.015 views
Lecture 13 Linux System Administration. Booting PROM (BIOS) — perform basic self-test (POST) and access parameters from nvram OS Loader — locate and run.
221 views
Mobility Presented by: Mohamed Elhawary. Mobility Distributed file systems increase availability Remote failures may cause serious troubles Server replication.
215 views
Hacking Unix and Unix Security Lesson 11. Let’s talk about Unix and Security Passwords Originally passwords in /etc/passwd. World readable as numerous.
221 views
User Management. Adding New Users Computer Center, CS, NCTU 3 ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888()
216 views
L INUX A DMINISTRATION Pandian Ganesan. AGENDA Linux Introduction User Administration Linux Networking Filesystem Management Basic Shell Scripting Q&A.
226 views
Hacking Unix and Unix Security
116 views
UNIX/LINUX II Final Presentation
40 views
Mobility
31 views
UNIX Technical Audit
32 views
Working with users and Groups
92 views
Being a multi-user system - UNIX and Linux have a tremendous amount of security to offer; many being open source, which can be validated and modified.
214 views