Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 86.
... follow the chapter demonstrations step-by-step on your own systems. Each file on the CD is discussed in detail and ... following command (for Red Hat systems): mount -t iso9660 /dev/cdrom /mnt/cdrom And to unmount: umount /mnt/cdrom It ...
... following command: host# rpm –ivh packagename.versionnumber.i386.rpm This command uses the -I option, which simply means install.The -vh options have the RPM utility go into verbose mode and report the installation progress using hash ...
... After verifying that you have keys and a revocation certificate, you are now able to import and export keys.To export your key, use the following command: gpg --export --armor > yourname.asc This command will create a file that contains ...
... Command> q Save changes y Now, you can issue the following command to check the latest GNU GPG RPM file: rpm -Kv your_rpm.i386.rpm You will receive a message that both the MD5 signature and the PGP signature are acceptable: rpm -Kv ...
... following commands: pgp –h pgp -k This book focuses on using GPG. NOTE Thus ... command can encrypt a file named managerreport.txt: gpg --encrypt --r ... following command: gpg --decrypt managerreport .txt.gpg > managerreport.txt. The ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |