Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 89.
... root access to the server. s Root kits Programs, such as ps, ls, or su, which will still work, but also thwart security by, for example, key logging the administrator's password and then sending it to an anonymous FTP.The malicious user ...
... root to lock the memory.As soon as this is done, GPG then runs under the permissions of the owner. NOTE Running an application as SUID root means that the. www.syngress.com Introduction to Open Source Security • Chapter 1 21.
... root means that the application is run as root, even though the owner who starts it is a nonroot user. By default, however, GPG is not installed as SUID root.To make it setuid root, do the following: 1. Find the application (in Red Hat ...
... root.test.com sec 1024D/3B386145 2000-07-01 jamesroot (root) <james@root.test.com> Create a revocation certificate for this key? y Please select the reason for the revocation: 1 = Key has been compromised 2 = Key is superseded 3 = Key ...
... root account > Reason for revocation: Key has been compromised For my keats system root account Is this okay? y You need a passphrase to unlock the secret key for user: "jamesroot (root) <james@root.test.com>" 1024-bit DSA key, ID ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |