Secure Unix security

16

Author: JT Smith

From IBM: “This article takes a look at a little shell application that uses an innovative approach to increasing open UNIX security. A step-by-step analysis of the code is provided. The author’s areas of expertise are in Web programming and cutting-edge network security development.”

Category:

  • Linux