Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 84.
... Connections Flag SYN FIN RST PSH ACK URG Description Synchronize sequence numbers. Used for connection establishment. The sender is finished with the connection. Used for connection termination. Reset the connection. Push the data ...
... Connections Iptables Masquerading Modules Using Iptables to Masquerade Connections Iptables Modules Exercise: Masquerading Connections Using Ipchains or Iptables Logging Packets at the Firewall Setting Log Limits Adding and Removing ...
... connection is able to obtain and then manipulate data.You will learn more about this type of attack in Chapter 7. The obvious response to this analogy and the threat of sniffing attacks would be,“Well, I guess I just won't send my ...
... connected to a network, especially the Internet. Hardening the operating system allows the server to operate efficiently and securely. This chapter includes the essential steps an administrator must follow to harden a Unix system ...
... (Connection dialog, control) 21 Telnet 23 SMTP 25 DNS 53 DHCP BOOTP Server 67 DHCP BOOTP Client 68 TFTP 69 Gopher 70 HTTP 80 POP3 110 NNTP 119 NetBIOS Session Service 139 Internet Message Access Protocol (IMAP), version 2 143 To explain ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |