Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 85.
... allows the server to operate efficiently and securely. This chapter includes the essential steps an administrator ... allow administrators to automate these processes using Bastille, sudo, logging enhancers such as SWATCH, and antivirus ...
... allows your system to perform NAT, serve as a small firewall, and deny certain connection types to your server. s Download and install RPM updates The most recent versions of the RPMs used on your system are downloaded and installed ...
... allows administrators to track the original root account.This is helpful for tracking hackers because Bastille notifies the second account to original account logins. If you always use the second account, then you know when a security ...
... allow files so that inetd must contact TCP Wrappers whenever it gets a request, instead of automatically running the ... allows access to the network.An information bulletin from the U.S. Department of Energy's Computer Incident Advisory ...
... allows them to work on their code and view their progress without opening the Web server to others network users. They access their local Web server by entering http://localhost. Continued 2. Bind the Web server to a specific interface ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |