发信人: haitong()
整理人: majorsun(1999-11-19 15:04:56), 站内信件
|
【 在 project (等待...) 的大作中提到: 】
: 【 在 haitong (天天向上) 的大作中提到: 】
: : 【 在 project (等待...) 的大作中提到: 】
: : .......
: 我在yahoo和你给的比如上去找,可反回的结果是
: .......
不好意思。我也忘了在哪里找到,反正是下面的一个,顺着找到这个文件
就 OK.
1.: http://snow.icestorm.com/damatrix/data.h...
?TRUSIX Rationale for Selecting Access Control List Features For Unix - Go to: _ grey.txt _ [ Grey Book ]
2.: http://www.genocide2600.com/~tattooman/h...
?Structural Versus Operational Intrusion Detection - Intrusion Detecti on White Paper - short and basic, comments requested. By John Kozubik .
3.: http://www.genocide2600.com/~tattooman/h...
?clearcase2.txt - More security holes found in Rational Software Clear Case - race conditions result in local root compromise.
?ClearCase.txt - Poor security coding leaves several race conditions a nd other security problems in Clear Case, a configuration management p rogram from Rational Software. Local root compromise. "clear_waste.sh"
?"Incremental Information Integrity" - An interesting paper that ratio nalizes network security by dividing network information into four cat egories and then assigning each layer/category a part in a traditional
4.: http://www.AntiOnline.com/archives/text/...
? Silver Trusted UNIX Working Group (TRUSIX) Rationale for Selecting A ccess Control List Features for the UNIX?
? Yellow Technical Rational Behind The Light Yellow Book
5.: http://www.planethack.com/texts.html
? Mentor's Last Words by The Mentor. The most inspirational text on wh o hackers are, and why hackers are.
6.: http://www.theargon.com/info/index.html
? Yellow Book Technical Rational Behind CSC-STD-003-85: Computer Secur ity Requirements -- Guidance for Applying the DoD TCSEC in Specific En vironments, 25 June 1985.
? Silver Book Trusted UNIX Working Group (TRUSIX) Rationale for Select ing Access Control List Features for the UNIX System, 7 July 1989.
7.: http://www.xs4all.nl/~l0rd/hack.htm
? Grey TRUSIX Rationale for Selecting Access Control List Features For The Unix System 38,835 bytes
8.: http://www.ssl.stu.neva.ru/psw/crack.htm...
? Operational systems Novell Netware passwords Weak hashing algorithm (邢囊下闻? ? Hash (16-byte PASSWORD bindery property for Novell 3.x) c ollision generator . Then login (3.x) using this . instant any free, w
9.: http://dracula.gda.osk.pl/~cracks/r.htm
?Rational Rose 98 (SP1) v4.5.8163.3 76Kb [19.04.99]
?Rational Rose 98SR1 4Kb [18.03.99]
10.: http://24.112.149.116/evc/pcrackspt.htm
?Rational Rose 98 v4.5.8163.3 (SP1) L oader evc_r98sp1.zip
11.: http://x-filez.harem2.pl/r.htm
? Rational Rose 98 Ent Ed 30 Day Trial
? Rational Rose 98 Enterprise
? Rational Rose 98 Enterprise
? Rational Rose 98 Enterprise 4.5.8054a
-- ※ 来源:.月光软件站 http://www.moon-soft.com.[FROM: 202.104.36.31]
|
|