S T U V
- KDE Desktop Environment
A desktop, incorporating a large suite of applications for Unix
workstations. While KDE includes a window manager, file manager, panel, control
center and many other components that one would expect to be part of a
contemporary desktop environment, the true strength of this exceptional
environment lies in the interoperability of its components
The authentication system of MIT's Project Athena. It is based on symmetric key
cryptography. Adopted by OSF as the basis of security for DME
A terminal program and file transfer protocol, kermit can be used to download
files from a remote system to your home computer. Kermit is distinguished by
it's ability to transfer files over telnet and other connections that would
corrupt a binary transfer
the fundamental part of the operating system that handles resource management,
process control, and Input/Output (I/O) support.
- Kernel headers
The header files define structures and constants that are needed for building
most standard programs. The header files are also needed for rebuilding the
- Key Escrow
Giving copies of your key to a third party, allowing them to decrypt messages.
Key Escrow is proposed as a solution to allow businesses to review documents
encrypted by their employees, and governments to intercept communications and
files encrypted by their citizens, such as the 'Clipper'
- Kirch, Olaf
author of the Linux Network Administrator's Guide. Olaf also moderates the Linux
Security Mailing Lists, developing the Linux NFS daemon and a kernel-based nfsd.
NFS file locking is also being worked on.
- korn shell
An enhanced version of the Bourne shell
Last Updated Saturday, December 04 2004 @ 09:44 AM EST