UNIX Security '93 | Secure RPC Authentication (SRA) for TELNET and FTP | David R. Safford, Douglas Lee Schales, David K. Hess |
UNIX Security '93 | The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment | Dave Safford, Douglas Lee Schales |
UNIX Security '93 | The Persistent Hacker | Eduardo Rodriguez |
UNIX Security '93 | Sendmail Without the Superuser | Mark E. Carson |
UNIX Security '92 | The Greatest Cracker-Case in Denmark: The Detecting, Tracing, and Arresting of Two International Crackers | Jörgen Bo Madsen |
UNIX Security '92 | Experiences of Internet Security in Italy | Alessandro Berni, Paolo Franchi, Joy Marino |
UNIX Security '92 | An Internet Gatekeeper | Herve Schauer, Christophe Wolfhugel |
UNIX Security '92 | Restricting Network Access to System Daemons Under SunOS | William LeFebvre |
UNIX Security '92 | There Be Dragons | Steve Bellovin |
UNIX Security '92 | An Internet Gatekeeper | Herve Schauer, Christophe Wolfhugel |
UNIX Security '92 | Network (In)Security Through IP Packet Filtering | D. Brent Chapman |
UNIX Security '92 | SOCKS | David Koblas, Michelle R. Koblas |
UNIX Security '92 | TCP Wrapper: Network Monitoring, Access Control, and Booby Traps | Wietse Venema |
UNIX Security '92 | Centralized System Monitoring with Swatch | Stephen E. Hansen, E. Todd Atkins |
UNIX Security '92 | Security Aspects of a UNIX PEM Implementation | James M. Galvin, David M. Balenson |
UNIX Security '92 | Introduction to the Shadow Password Suite | John F. Haugh II |
UNIX Security '92 | Giving Customers the Tools to Protect Themselves | Shabbir J. Safdar |