Linux and Internet Security
Unix for Librarians
Web security
BACKFiL Finding Files you left on the server
sun solaris
Linux Hacking
Foss Lab Manual
Linux Users and Groups Management. Introduction Ubuntu Linux uses groups to help you manage users, set permissions on those users, and even monitor how.
Chapter 4 Hacking Windows Part 2. Authenticated Attacks Privilege Escalation Pilfering –Grabbing the Password Hashes –Cracking Passwords –LSADump –Previous.
Agenda Basic Unix Commands (Chapters 2 & 3) Miscellaneous Commands: whereis, which, whoami, finger, passwd, cal, date Working with Files: cat, more, less.
IHEP Site Status Jingyan Shi, [email protected] Computing Center, IHEP 2015 Spring HEPiX Workshop.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Passwords in Unix/Linux Systems.