This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources. Find sources: "Unix security" – news · newspapers · books · scholar · JSTOR(April 2024)
This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations.(April 2024) (Learn how and when to remove this message)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Unix security" – news · newspapers · books · scholar · JSTOR(September 2014) (Learn how and when to remove this message)
(Learn how and when to remove this message)
Unix security refers to the means of securing a Unix or Unix-like operating system.
Unixsecurity refers to the means of securing a Unix or Unix-like operating system. A core security feature in these systems is the file system permissions...
A Unix domain socket aka UDS or IPC socket (inter-process communication socket) is a data communications endpoint for exchanging data between processes...
Unix System V (pronounced: "System Five") is one of the first commercial versions of the Unix operating system. It was originally developed by AT&T and...
error or non-malicious meddling. The md5sum program is included in most Unix-like operating systems or compatibility layers such as Cygwin. The original...
Unix (/ˈjuːnɪks/ , YOO-niks; trademarked as UNIX) is a family of multitasking, multi-user computer operating systems that derive from the original AT&T...
client-server computing vendor, before later acquiring a license for the UNIXsecurity product UPM (now owned by Quest Software) and rebranding their version...
p0f is a passive TCP/IP stack fingerprinting tool. p0f can attempt to identify the system running on machines that send network traffic to the box it is...
Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives. It assists...
Windows Services for UNIX (SFU) is a discontinued software package produced by Microsoft which provided a Unix environment on Windows NT and some of its...
sites for which access is redirected. SquidGuard must be installed on a Unix or Linux computer such as a server computer. The software's filtering extends...
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of...
Firewall security log According to Stefan Axelsson, "Most UNIX installations do not run any form of security logging software, mainly because the security logging...
with Richard van den Berg, an independent Dutch security consultant. The project is used on many Unix-like systems as an inexpensive baseline control...
passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is...
Additionally, suEXEC perform a multi-step check on the executed CGI to ensure security for the server (including path-checks, a limit of permitted commands, etc...