Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 77.
... default, however, GPG is not installed as SUID root.To make it setuid root, do the following: 1. Find the application (in Red Hat Linux, GPG is at /usr/bin/gpg). 2. If you are not already root, become root with the command su. 3. Issue ...
... default. 5. Choose 1 to generate a new signing key. 6. You will be asked to choose the size of your key. Enter 1024, and then press ENTER. 7. Enter a user ID for your public key. Enter your name and e-mail address. This will become your ...
... default. 7. ICMP services to audit (name or port number); an (Blank) example is the Microsoft “echo-request” service (Microsoft ping and tracert commands). 8. TCP service names or port numbers to allow on public (Blank) interfaces ...
... default 99,999 days, replace the login.defs file with the backup file. Enter the following: cd /root/Bastille/undo/backup/etc/login.defs cp logindefs /etc/login.defs cp: overwrite '/etc/login.defs'? y The backup file replaces the ...
... default time is five minutes. The sudo configurations are written to the /etc/sudoers file. This file can be used on multiple systems and allows administration from a central host. The file is designed to allow user privileges on a host ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |