Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 37.
... bob New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully kill –HUP [PID NUMBER] sudo /sbin/ifconfig eth0 down ps aux. www.syngress.com Hardening the Operating System • Chapter 2 89.
... eth0 down Permission is denied because bob is not allowed to deactivate the system's interface. 7. To deactivate the interface, bob must use sudo. Enter: sudo /sbin/ifconfig eth0 down You will be successful. Please note that sudo will ...
... Log on as bob. Deactivate the interface using sudo: 5. You will not be prompted for your password and. sudo /sbin/ifconfig eth0 down ps aux | grep syslogd sudo ls /root www.syngress.com 92 Chapter 2 • Hardening the Operating System.
... eth0 up. Sudo. Logging. As mentioned previously, sudo logs which users run what commands. Logging does not occur automatically.You must set up sudo and syslogd to log commands. This involves two steps. First, you must create a sudo logfile ...
... eth0 down sudo /sbin/ifconfig eth0 up Restart one of the httpd processes (or another process) using the kill command by entering: ps aux | grep httpd Choose an Apache (httpd) PID from the list that appears. Enter: sudo kill –HUP [PID ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |