Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 82.
... Host-Based IDS 220 Important PortSentry Files 221 Installing PortSentry 222 Configuring PortSentry to Block Users ... Remote Host 251 Identifying Snort Add-Ons 251 SnortSnarf 252 Learn the Flags Used in TCP Connections Flag SYN FIN ...
... hosts.The auditing host has the following responsibilities: s Obtain relevant data concerning the network without affecting the performance of the network. s Provide remote administration capabilities. s Generate logs so that ...
... remote logging Two additional logs can be added to /var/log/: s /var/log/kernel (kernel messages) s /var/log/syslog (error and warning severity messages) You can also log to a remote logging host if one exists. s Process accounting ...
... Host Monitors battery power on laptop computers Unix network file systems ... remote systems. SSH encrypts usernames, passwords, and all information ... remote connections. s Deactivate and chroot named Similar to other services, named ...
... hosts No .allow to optimize use of Wrappers? 2. Would you like to set sshd to accept connections only No from a small ... remote logging host? No 2a. What is the IP address of the machine you want to 127.0.0.1 log to? Continued Table 2.5 ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |