Fork bomb - Wikipedia, the free encyclopedia
The concept behind the fork bomb: the processes recursively fork ... Retrieved from "http://en.wikipedia.org/wiki/Fork_bomb" Categories: Denial-of-service ...
http://en.wikipedia.org/wiki/Fork_bomb
popularity:
security
linux
fork
unix
scripting
programming
fun
wikipedia
hacks
forkbomb
|
Secure Programming for Linux and Unix HOWTO
No information avaiable
similarity:
popularity:
security
programming
linux
unix
c
web
japanese
howto
php
python
|
Steve Friedl's Home Page
You'll find a collection of tools, tech tips, and other information in the scope ... Now hosted at blog.unixwiz.net — added 2009/03/15. So you want to be a ...
similarity:
popularity:
unix
security
linux
programming
sysadmin
reference
consulting
blog
tips
tutorial
|
Secure Programming for Linux and Unix HOWTO
This book provides a set of design and implementation guidelines for writing ... Such programs include application programs used as viewers of remote data, web ...
similarity:
popularity:
security
programming
linux
unix
c
howto
secure
development
c++
c\/c++
|
Linux Shell Scripting Tutorial - A Beginner's handbook
... Script Commands r r r r r r r r r http://www.freeos.com/guides/lsst ... ( 3) Shell Arithmetic http://www.freeos.com/guides/lsst/shellprog.htm (5 of 19) ...
similarity:
popularity:
linux
shell
scripting
tutorial
programming
bash
unix
howto
reference
tutorials
|
BASTILLE-LINUX
Hardening system supporting the Red Hat, Debian, Mandrake, SuSE, and TurboLinux Linux distributions along with HP-UX and Mac OS X.
similarity:
popularity:
linux
security
sysadmin
software
hardening
tools
unix
firewall
opensource
osx
|
Advanced Bash-Scripting Guide
It serves as a textbook, a manual for self-study, and a reference and ... The exercises and heavily-commented examples invite active reader participation, ...
similarity:
popularity:
bash
linux
shell
scripting
programming
reference
unix
tutorial
howto
guide
|
RootPrompt -- Nothing but Unix
Unix news and information for sysadmins.
similarity:
popularity:
linux
unix
news
sysadmin
security
blog
geek
tech
programming
technology
|
TECH SOURCE FROM BOHOL: 10 Best Hacking and Security Software Tools for Linux
Hacks, News, Tutorials, Reviews about Linux, Open Source, Ubuntu, Google, Apple, Microsoft, Programming, Gadgets, and everything related to Digital Technology.
similarity:
popularity:
linux
security
tools
hacking
software
unix
sysadmin
hack
utilities
ubuntu
|
chkrootkit -- locally checks for signs of a rootkit
chkrootkit locally checks for signs of a rootkit. Includes ifpromisc.c to check if the interface is in promiscuous mode, chklastlog.c and chkwtmp.c to check for ...
similarity:
popularity:
security
linux
rootkit
tools
software
sysadmin
unix
opensource
tool
hacking
|
LinuxCommand.org: Writing shell scripts.
To get it to do that, we use the power of the shell to automate things. ... Scripts are collections of commands that are stored in a file. The shell can read this ...
similarity:
popularity:
linux
shell
scripting
bash
programming
tutorial
unix
howto
scripts
reference
|