An Architectural Overview of UNIX Network Security

1. Introduction The goal of this paper is to present my concept of a UNIX network security architecture based on the Internet connectivity model and Firewall approach to implementing security. This paper defines several layers of a firewall, which depict the layers of vulnerability. This paper also provides some subjective comments on some of the […]

Read More

NFS Tracing: Unlocking Insights into Filesystem Activity

Traces of filesystem activity play a crucial role in analyzing system behavior, enabling researchers to gain valuable insights into various aspects of file management. However, obtaining accurate and comprehensive traces can be challenging, often requiring modifications to the filesystems being monitored and incurring runtime overhead. Consequently, there is a scarcity of filesystem traces, limiting the […]

Read More

How to Install FreeBSD? A Step by Step Guide

A step-by-step guide to installing FreeBSD 5. It assumes moderate experience with linux and leaves you with a fully updated FreeBSD system. FreeBSD Installation A. 5.x vs 4.x The first thing to understand about FreeBSD is that there are two lines of development. The -STABLE branch is marked with a 4.x version number and the […]

Read More

How to Hack UNIX for Beginners

In the following file, all references made to the name Unix, may also be substituted to the Xenix operating system. Brief history: Back in the early sixties, during the development of third generation computers at MIT, a group of programmers studying the potential of computers, discovered their ability of performing two or more tasks simultaneously. […]

Read More