Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 87.
... Passwords (OTP and OPIE) What Files Does OPIE Replace? How Does OPIE Work? OPIE Files and Applications opiepasswd Password Format Using opiekey Using opieinfo and opiekey to Generate a List Installing OPIE Configuration Options ...
... password and log in to the system. So, how can you determine if this download is secure? One of the best ways is to ... passwords as it communicated with other hosts.As a result, this particular operating system fell out of favor ...
... password to a person? Even if you use a telephone (a very slow, awkward option), you are not guaranteed safety.After all, your friend who receives this password could write it down on a sticky note, exposing it to anyone passing by ...
... password to use his public key to sign the message.The encrypted and signed message is then sent across the Internet, where User B uses her private key to decrypt the message. How has this process solved the symmetric encryption problem ...
... password in some way.You only distributed half of the password (the public key).And, usually, it is extremely difficult to guess the private key from the public key. It is, of course, mathematically possible to use the public key to ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |