Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 76.
... Entries 236 Running Snort as a Network-Based IDS 236 Ignoring Hosts 237 Additional Logging Options:Text files,Tcpdump, and Databases 237 Configuring Snort to Log to a Database 238 Controlling Logging and Alerts 239 Getting Information ...
... entries and passes them into a "first in, first out" (FIFO) pipe, which Firelogd can then process. s Once its buffer is full, it e-mails a report of suspicious traffic to an account of your choosing. You can have it mailed to a local ...
... entries in the respective file and restarting the service. If the service is commented out, it will not restart.The next section demonstrates how to disable the Telnet, FTP, and rlogin services. Telnet. and. FTP. Most administrators find ...
... entry in /etc/xinetd.d/ finger file. Refer to Table 2.2 to view other ports you may wish to block. It lists common ports blocked by firewalls. However, these ports can also be blocked at the server itself. Follow these steps to disable ...
... entries, user specifications and aliases.The following examples show you how to use user specifications, which define which user is allowed to run what commands.Aliases are basically variables. The sudoers file contains a root entry.The ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |