26,363 research outputs found

    A Comparative Study of Security Mechanism differentiation between Windows 2000 and UNIX Operating Systems

    Get PDF
    "Security" is hard to formalize, hard to design (and design for), hard to implement, hard to verify, hard to configure, and hard to use. It is particularly hard to use on a platform such as Windows, which is evolving, security-wise, along with its representative user-base. The primary environment in which a typical Windows system exists has traditionally been hostile, especially after the advent of the Internet. While UNIX systems share the same environment today, their traditional environments were comparatively trusted: research labs and universities. Similarly, UNIX users have had backgrounds differing from Windows users. Keywords: UNIX, Windows 2000, Security Mechanism, Operating Syste

    A Turkish password cracker for UNIX based operating systems

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2001Includes bibliographical references (leaves: 47-48)Text in English; Abstract: Turkish and Englishx, 48 leavesUNIX and UNIX-based operating systems have been widely utilized in local area and wide area network systems that supply application and development chain of users through remote access as well as online connections. Although UNIX operating system has got powerful tools which have secure methods for user authentication, user management and for password storage, weak password choices of the users affect the entire system security negatively. This study aims to crack the password hashes which are encrypted by DES using the method of dictionary attack. The developed application is introduced and compared with the previous utilities. Password encryption, password storage, and the structure which was developed against a possible dictionary attack of UNIX are examined. The good password choosing method for the users and the system administrator are given

    The Case Report of the Portscan Detection System in a CATV Internet

    Get PDF
    In this paper, we report design and implementation of a portscan detection system for the CATV internet network. The portscan detection system runs on the UNIX operating system. We report the example run of the portscan detection system on the computer connected to the CATV internet network for two months. Our detection system was able to detect portscan and unusual access preswming on the Microsoft Windows operating system security hole (MS03-049)

    Робоча програма навчальної дисципліни "Операційні системи" для студентів, які навчаються за спеціальністю 126 "Інформаційні системи та технології". Program of the Discipline «Operating Systems» Specialty «126 Information systems and technologies»

    Get PDF
    Розглядаються фундаментальні концепції сучасних операційних систем. Вивчаються основні функції операційних систем: керування процесами, пам'яттю, файлові системи, засоби вводу-виводу, мережні засоби, забезпечення безпеки тощо. Розкриваються особливості організації операційних систем UNIX/Linux та Windows. Вивчаються програмні інтерфейси, необхідні прикладним програмам для доступу до засобів операційних систем. Розглядається специфіка використання системних викликів UNIX/Linux і функцій Win32 АРІ. Fundamental concepts of modern operating systems are considered. The basic functions of operating systems are studied: process management, memory, file systems, input-output facilities, network facilities, security and the like. The features of the organization of UNIX / Linux and Windows operating systems are revealed. The program interfaces required by application programs for accessing operating system tools are being studied. The specifics of using UNIX / Linux system calls and Win32 API functions are considered

    UNIX secure server : a free, secure, and functional server example

    Get PDF
    The purpose of this thesis work was to introduce UNIX server as a personal server but also as a start point for investigation and developing at a professional level. The objective of this thesis was to build a secure server providing not only a FTP server but also an HTTP server and a cloud system for remote backups. OpenBSD was used as the operating system. OpenBSD is a UNIX-like operating system made by hackers for hackers. The difference with other systems that might partially provide solutions is that OpenBSD requires a fully understanding of the configuration files in order to cover all the security holes, therefore, is needed to go through the documentation and examples of these files. As a result we have a fully functional server with the next following features: anonymous FTP server, HTTP server including PHP, SSH server and of course a backup system in a cloud with cryptography enabled

    iWorm hack shows Macs are vulnerable too

    Get PDF
    The computer operating systems and applications we use today have often evolved over many years, decades even, and contain tens or hundreds of millions of lines of code. Flaws in that code – and there will always be some – give rise to security problems that, in an internet-connected world, are an increasing problem. Many are found in code written in the C++ programming language – in Microsoft Windows, in Java, in applications such as Abode Flash or Reader, the Outlook email client, browsers such as Internet Explorer and Firefox, and increasingly Linux and OS X. Any issues found to affect Linux and other Unix-like operating systems causes problems for Apple because OS X is Unix-like in nature. Apple’s decision to redevelop a new operating system for the Macintosh based on Unix was a momentous one. A family of related operating systems, Unix has evolved since the early 1970s and continues to be used and developed today. Technically OS X is a “Unix-like” operating system called Darwin; Linux is another Unix-like operating system. This decision meant the company could rely on the stability of Unix and focus on the user experience. Will this decision return to bite Apple, however? The flaws now being discovered in Unix-like operating systems also affect OS X. Many bugs are being found that have gone unnoticed for years – the Heartbleed flaw in OpenSSL for example relates to C++ code written by Eric Young in 1998

    BGrep and BDiff: UNIX Tools for High-Level Languages

    Get PDF
    The rise in high-level languages for system administrators requires us to rethink traditional UNIX tools designed for these older data formats. We propose new block-oriented tools, bgrep and bdiff, operating on syntactic blocks of code rather than the line, the traditional information container of UNIX. Transcending the line number allows us to introduce longitudinal diff, a mode of bdiff that lets us track changes across arbitrary blocks of code. We present a detailed implementation roadmap and evaluation framework for the full version of this paper. In addition we demonstrate how the design of our tools already addresses several real-wold problems faced by network administrators to maintain security policy
    corecore