Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 63.
... Disabling Unnecessary Services and Ports Services to Disable The xinetd.conf File Locking Down Ports Well-Known and Registered Ports Determining Ports to Block 15 16 16 17 18 19 20 21 21 29 30 30 31 31 32 33 35 35 38 41 42 42 42 43 44 ...
... disabling traffic emanating from inside the network s Enabling and disabling traffic emanating from outside the network Figure 1.11 shows two networks communicating over the Internet. Each uses a firewall to monitor, log, and forbid ...
... Disabling Unnecessary Services and Ports s Locking Down Ports s Hardening the System with Bastille s Controlling and Auditing Root Access with Sudo s Managing Your Log Files s Using Logging Enhancers ☑ Summary ☑ Solutions Fast Track ...
... disabling unnecessary services, locking down ports, logging, and maintenance. Open source programs allow administrators to automate these processes using Bastille, sudo, logging enhancers such as SWATCH, and antivirus software. Before ...
... disable several vulnerable services. Later in this lesson, you learn how to disable unnecessary services and ports using the open source program Bastille. Services. to. Disable. Linux, by nature, is more secure than most operating systems ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |