| Display title | Unix security |
| Default sort key | Unix security |
| Page length (in bytes) | 4,973 |
| Namespace ID | 0 |
| Page ID | 243928 |
| Page content language | en - English |
| Page content model | wikitext |
| Indexing by robots | Allowed |
| Number of page watchers | 43 |
| Number of page watchers who visited in the last 30 days | 6 |
| Number of redirects to this page | 2 |
| Counted as a content page | Yes |
| Wikidata item ID | Q3495573 |
| Central description | security technologies, conventions, and techniques used on Unix-like operating systems |
| Page views in the past 30 days | |
| Edit | Allow all users (no expiry set) |
| Move | Allow all users (no expiry set) |
| Page creator | Htaccess (talk | contribs) |
| Date of page creation | 11:40, 11 June 2003 |
| Latest editor | IXNL-UUCP (talk | contribs) |
| Date of latest edit | 13:11, 2 February 2025 |
| Total number of edits | 236 |
| Recent number of edits (within past 30 days) | 0 |
| Recent number of distinct authors | 0 |
| Hidden categories (10) | This page is a member of 10 hidden categories (help):
|
| Transcluded templates (80) | Pages transcluded onto the current version of this page (help):
|
| Wikidata entities used in this page | |