Knowledge (XXG)

Category:Operating system security

Source 📝

206: 148: 62: 260: 570: 575: 414: 101: 49: 419: 321: 123: 17: 377: 342: 83: 228: 372: 449: 399: 182: 118: 439: 113: 25: 289: 476: 255: 404: 309: 429: 238: 326: 331: 21: 409: 367: 336: 160: 486: 304: 233: 172: 481: 564: 498: 66: 471: 177: 53: 444: 459: 434: 355: 223: 539: 510: 294: 128: 551: 522: 424: 299: 277: 211: 454: 387: 382: 272: 194: 143: 138: 133: 37:
This category has the following 2 subcategories, out of 2 total.
527: 96: 82:
The following 65 pages are in this category, out of 65 total.
243: 207:
Generic Security Services Application Program Interface
149:Comparison of privilege authorization features 79:Pages in category "Operating system security" 8: 20:, operating system features that provide 84:This list may not reflect recent changes 261:Multiple Independent Levels of Security 16:This category includes articles about 63:Microsoft Windows security technology 7: 415:Security-evaluated operating system 102:Address space layout randomization 88: 39: 31: 18:security-focused operating systems 14: 420:Security-focused operating system 322:Partitioning Communication System 124:Capability-based operating system 378:Resource Access Control Facility 343:Provably Secure Operating System 1: 229:Lightweight Portable Security 373:Replicant (operating system) 571:Operating system technology 450:Subgraph (operating system) 400:Sandbox (computer security) 183:Executable-space protection 119:Capability-based addressing 592: 576:Computer security software 440:Solaris Trusted Extensions 114:C-list (computer security) 290:OpenBSD security features 50:MacOS security technology 477:Trusted operating system 256:Mandatory access control 405:Secure operating system 310:OS-level virtualization 430:Singularity (software) 239:Linux Security Modules 327:Privilege (computing) 24:and security-focused 332:Privilege escalation 22:application security 410:Security descriptor 368:Reference monitor 337:Process isolation 161:Docker (software) 583: 487:Type enforcement 345: 305:Openwall Project 234:Linux namespaces 173:End node problem 68: 55: 591: 590: 586: 585: 584: 582: 581: 580: 561: 560: 559: 558: 557: 556: 544: 532: 515: 503: 491: 482:Trusted Solaris 464: 392: 360: 348: 341: 314: 282: 265: 248: 216: 199: 187: 165: 153: 106: 76: 75: 74: 73: 70: 69: 57: 56: 30: 12: 11: 5: 589: 587: 579: 578: 573: 563: 562: 555: 554: 548: 545: 543: 542: 536: 533: 531: 530: 525: 519: 516: 514: 513: 507: 504: 502: 501: 495: 492: 490: 489: 484: 479: 474: 468: 465: 463: 462: 457: 452: 447: 442: 437: 432: 427: 422: 417: 412: 407: 402: 396: 393: 391: 390: 385: 380: 375: 370: 364: 361: 359: 358: 352: 349: 347: 346: 339: 334: 329: 324: 318: 315: 313: 312: 307: 302: 297: 292: 286: 283: 281: 280: 275: 269: 266: 264: 263: 258: 252: 249: 247: 246: 241: 236: 231: 226: 220: 217: 215: 214: 209: 203: 200: 198: 197: 191: 188: 186: 185: 180: 175: 169: 166: 164: 163: 157: 154: 152: 151: 146: 141: 136: 131: 126: 121: 116: 110: 107: 105: 104: 99: 93: 90: 89: 80: 77: 72: 71: 61: 60: 58: 48: 47: 44: 41: 40: 35: 32: 13: 10: 9: 6: 4: 3: 2: 588: 577: 574: 572: 569: 568: 566: 553: 550: 549: 546: 541: 538: 537: 534: 529: 526: 524: 521: 520: 517: 512: 509: 508: 505: 500: 499:Unix security 497: 496: 493: 488: 485: 483: 480: 478: 475: 473: 470: 469: 466: 461: 458: 456: 453: 451: 448: 446: 443: 441: 438: 436: 433: 431: 428: 426: 423: 421: 418: 416: 413: 411: 408: 406: 403: 401: 398: 397: 394: 389: 386: 384: 381: 379: 376: 374: 371: 369: 366: 365: 362: 357: 354: 353: 350: 344: 340: 338: 335: 333: 330: 328: 325: 323: 320: 319: 316: 311: 308: 306: 303: 301: 298: 296: 293: 291: 288: 287: 284: 279: 276: 274: 271: 270: 267: 262: 259: 257: 254: 253: 250: 245: 242: 240: 237: 235: 232: 230: 227: 225: 222: 221: 218: 213: 210: 208: 205: 204: 201: 196: 193: 192: 189: 184: 181: 179: 176: 174: 171: 170: 167: 162: 159: 158: 155: 150: 147: 145: 142: 140: 137: 135: 132: 130: 127: 125: 122: 120: 117: 115: 112: 111: 108: 103: 100: 98: 95: 94: 91: 87: 85: 78: 64: 59: 51: 46: 45: 42: 38: 34:Subcategories 33: 29: 27: 23: 19: 81: 36: 15: 472:Toor (Unix) 178:Exec Shield 565:Categories 445:Ssh-keygen 460:Superuser 26:libraries 435:SlimRoms 356:Qubes OS 224:Lastline 540:XTS-400 511:Vkernel 295:OpenBSM 129:Cgroups 552:ZeroVM 523:Whonix 425:SetACL 300:OpenVZ 278:NX bit 212:Genode 67:(45 P) 455:SubOS 388:Runas 383:RSBAC 273:NixOS 195:FLASK 144:Chown 139:Chmod 134:Chgrp 54:(3 P) 97:ACF2 528:W^X 244:LXC 567:: 86:. 65:‎ 52:‎ 28:. 547:Z 535:X 518:W 506:V 494:U 467:T 395:S 363:R 351:Q 317:P 285:O 268:N 251:M 219:L 202:G 190:F 168:E 156:D 109:C 92:A 43:M

Index

security-focused operating systems
application security
libraries
MacOS security technology
Microsoft Windows security technology
This list may not reflect recent changes
ACF2
Address space layout randomization
C-list (computer security)
Capability-based addressing
Capability-based operating system
Cgroups
Chgrp
Chmod
Chown
Comparison of privilege authorization features
Docker (software)
End node problem
Exec Shield
Executable-space protection
FLASK
Generic Security Services Application Program Interface
Genode
Lastline
Lightweight Portable Security
Linux namespaces
Linux Security Modules
LXC
Mandatory access control
Multiple Independent Levels of Security

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.