Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,368,225 papers from all fields of science
Search
Sign In
Create Free Account
Chroot
Known as:
Chroot jails
, Jail (disambiguation)
, Chroot prison
Expand
A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Amavis
Cd (command)
Child process
Chrome OS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Noam Moscovich
,
Ron Bitton
,
+5 authors
A. Shabtai
arXiv.org
2020
Corpus ID: 220280420
The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we…
Expand
2017
2017
Gestión Elástica de Clusters de Contenedores
Yuriy Yatsyk
2017
Corpus ID: 125093063
2017
2017
Orquestación de aplicaciones corporativas mediante virtualización de contenedores usando Docker
Fernández Ameijeiras
,
José Ángel.
2017
Corpus ID: 133092545
in English, 250 words or less): In this job we do a study of container virtualization technologies will be carried out in order…
Expand
2014
2014
A Case Study in Preserving a High Energy Physics Application
Haiyan Meng
,
M. Wolf
,
Peter Ivie
,
A. Woodard
,
M. Hildreth
,
D. Thain
2014
Corpus ID: 268110432
The reproducibility of scientific results increasingly depends upon the preservation of computational artifacts. Although…
Expand
2011
2011
PIGA-HIPS: Protection of a shared HPC cluster
M. Blanc
,
Jérémy Briffaut
,
C. Toinard
,
Damien Gros
2011
Corpus ID: 53348737
Protecting a shared High Performance Computing cluster is still an open research problem. Existing solutions deal with sand…
Expand
2006
2006
iPoJ: User-Space Sandboxing for Linux 2.4
Brian Greskamp
,
Pablo Montesinos
,
Paul Sack
2006
Corpus ID: 2535214
The Internet is a dangerous place. Both na ı̈ve and educated users routinely become infected with viruses and accidentally run…
Expand
2006
2006
Configuración de la shell y del chroot
J. Caballo
2006
Corpus ID: 190330986
En esta tercera entrega de la serie GForge vamos a ver como se configura la shell del programa y el entorno chroot. Estos pasos…
Expand
2006
2006
chroot + UnionFS: qué se puede conseguir sumando directorios.
Jesús Álamos Zorrilla
2006
Corpus ID: 171608006
?Como probar KDE 4 sin dejar de trabajar con KDE 3? ?Como modificar una Live-CD cuando no hay espacio en el disco duro? ?Como…
Expand
2003
2003
INCREASING SYSTEM SECURITY BY IMPLEMENTING CHROOT UNDER SOLARIS
B. Teer
2003
Corpus ID: 63512055
The server′s security problems include security problems of system itself and those caused by the daemon that provides services…
Expand
1998
1998
CHROOT y seguridad
Jesús Cea Avión
1998
Corpus ID: 169888167
La informatica, y la programacion en particular, estan muy lejos todavia de convertirse en ciencia. De momento apenas llegan a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE