contact contact contact
  Articles | Editorials | Reviews | InfoSec Directory | News | Press Releases
Security in Plan 9 Operating System
Added: Saturday, 9 April 2005
Publisher:
Category: Network Security

The security architecture of the Plan 9" operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to make the system more conve­nient to use securely. Plan 9 has thus improved in two ways not usually seen together: it has become more secure and easier to use.

The central component of the new architecture is a per-user selfcontained agent called factotum. Factotum securely holds a copy of the user's keys and negotiates authentication protocols, on behalf of the user, with secure services around the network.

Download | InfoSec Directory

SecurityWatch - 24x7 advisory and vulnerability automated monitoring service.

GFI LANguard Network Security Scanner - Network-wide security vulnerability scanning & fixing - Free version available.

Network Security Software - Sponsored by GFI Network Security.

InfoSec Directory
» Managing for Enterprise Security
» Effective Use of Authentication Concepts to Enhance Web Security
» Understanding WiMAX and 3G for Portable/Mobile Broadband Wireless
» Bluetooth Security Tools
» Windows/Linux Security - Web Server Role
Latest Press Releases
» Internet Security Systems Releases Proventia Desktop
» AirMagnet and Colubris Networks Raise the Bar for Highly Secure WLAN Deployments
» 8e6 Technologies & Netdata Launch New Spyware Defence for Companies at the InfoSecurity Show
» Web server attacks & website defacements increase by 36% according to new independent report on cybercrime
» Fortress Technologies Receives First-Ever DITSCAP Certification
» Fortress Expands Global Distribution Network of Award-Winning Wireless Security Products
More Articles
» Is Machine-To-Machine (M2M) The Gap In Your Security?
» Password overload
» Mozilla: The Honeymoon is over
» VoIP – What’s the Real Opportunity for Small Businesses?
» Run Your IT Department Like a Business! What?
 Copyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: Privacy 
Site Meter