Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux Security Cookbook

Авторы: Barrett D.J., Byrnes R.G., Silverman R.

Аннотация:

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.


Язык: en

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 332

Добавлена в каталог: 02.08.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Linux machine acting as
Linux recording of for each user      
Linux shell scripts in
Linux, website for      
Linux-PAM, web site      
ListenAddress statements, adding
ListenAddress statements, adding to sshd_config
listfile      2nd
listfile module (PAM)      
listing      
listing all files
listing all sudo invocation attempts      
listing firewall rules
listing for GnuPG
listing invocations      
listing network interfaces
listing permissible commands for root privileges      
listing scripts only      
listing with klist command      
loading at boot time      
loading configuration      
loading firewall configuration      
loading firewall rules at boot time      
local acces, permitting while blocking remote access      
local activities, examining      
local facilities (system messages)      
local filesystems, searching      
local key (Tripwire)      
local mail (acceptance by SMTP server)      
local network activities      
local password authentication, using Kerberos with PAM      
local vs. remote filesystems      
local, authentication via (Kerberos with PAM)
localhost
log files      
log files created by, permissions and      
log files, combining      
logfile group configuration file
logfile group configuration file (logwatch)      
logger program      
logging      
logging access to services      
logging and dropping certain packets      
logging into remote host      
logging messages remotely      
logging output
logging remotely
logging Snort data to libpcap-format files      
loghost      
login information about, printing      
login passwords      
login shells, root      
login, testing for strength      
Logins      
logins and passwords
logins, preventing on terminal devices      
logouts, history of all on system      
logrotate program      2nd 3rd
LogWatch      
logwatch filter for services not supported
logwatch, designing for      
looking for
looking up
lsh (SSH implementation)      
lsof command      
lsof command, examining processes      
lsof command, investigating processes with
m4 macro processor      
MAC      
MAC addresses      
Mail      [See email IMAP POP]
Mail application (Mozilla)      
mail clients
mail delivery with
mail facility (system messages)      
mail server support for SSL      
mail server, running with      
mail server, running with SSL      
mail servers
mail servers (IMAP/POP), protection by SSL
mail session security
mail sessions for Evolution
mail, receiving mail without running
Mailcrypt      
Mailcrypt package      [See Mailcrypt]
Mailcrypt package, using with GnuPG
Mailcrypt, using with
mailpgp (script for encrypting/sending email)
mailsnarf command
maintaining encrypted files
maintaining encrypted files with vim
malicious program, /tmp/ls
man-in-the-middle (MITM)
Man-in-the-middle (MITM) attacks
man-in-the-middle attacks, risk of
manual      
manual integrity checks
manual integrity checks, running with      
manual integrity checks, using instead of
marking files for inclusion or exclusion from Tripwire database
mask format, CIDR
Massachusetts Institute of Technology (MIT) Kerberos
master password for KDC database
matching a filter expression, searching network traffic for      
matching anything (ALL keyword)      2nd
matching with fgrep command
max_load keyword (xinetd)      2nd
mc-deactivate-passwd to force passphrase erasure      
mc-encrypt function      
MD5 checksum      
MD5-hashed passwords stored in shadow file (v. 8.0)
measuring for operating systems      
merging lastlog databases from several systems      
merging log files
merging system log files
MH (mail handler)      
MH, integrating with      
mirroring a set of files securely between machines
mirroring set of files securely between computers      
MIT Kerberos      
MIT Kerberos-5
MITM      [See man-in-the-middle attacks]
modifying      
modifying KDC database for
modifying KDC database for host      
modifying to invoke tcpd
modifying to invoke tcpd in /etc/xinetd.d startup file      
Modules      
monitoring and intrusion detection      [See intrusion detection for networks monitoring systems for suspicious activity]
monitoring login activity      
monitoring suspicious activity      
monitoring systems for suspicious activity
monitoring tools for networks
monitoring traffic on      
morepgp (script for decrypting/reading email)
mount command
mounted, listing in /proc/mounts      
mounts file (/proc)
Mozilla      
Muffet, Alec (Crack utility)
multi-homed hosts
multi-homed server machines, socket mail server is listening on
multicast packets      
multiple root accounts
multiple systems, monitoring problems with
multithreaded services (in inetd.conf)
mutation in attacks against protocols
mutt client connection over IMAP, testing      
mutt mail client, use of      
mutt mail client, using with      
mutt mailer      
mutt mailer, using with
name-of-source and name-of-destination      
NAMEINARGS flag for xinetd
NAT gateway, canonical client hostname and      
National Infrastructure Protection Center (NIPC) (U.S.)      
National Institutes of Health, ONetwork and Network Monitoring SoftwareO page
native support by Mozilla
nc command
nc command, using
netgroups
Netscape, certificate storage      
netstat command      
network (/etc/init.d startup file)      
network access control
network configuration of your systems, attack vulnerability and
network connections for all
network connections for processes, listing
network filesystems
network interfaces      
Network Intrusion Detection System (NIDS)
network intrusion detection systems (NIDS)      
network monitoring tools
network protocols, detecting insecure      
network script      
network services, access control facilities
network switches, packet sniffers and      
network trace files, ngrep      
network, detecting insecure
network-intrusion detection with Snort      2nd
Networking      
networking, important files for (/proc/net/tcp and /proc/net/udp)      
networks      
new host, adding to KDC database      
Newsgroups application (Mozilla)      
NFS      [See network filesystems]
ngrep program      
ngrep, finding strings in network traffic      
ngrep, using for      
NIDS      [See network intrusion detection systems Snort]
NIH page      
nmap -O command      
nmap -o options, formats of      
nmap command      
nmap command, port scanning capabilities      
nmap command, using for      
nmap port scan detected      
nmap, use of TCP and ICMP pings for host discovery      
nmapfe program      2nd
nmh (mail handler)      
NNTP, tunneling with SSH      2nd
nodev option to prohibit device special files      
noexec option      
non-local mail (acceptance by SMTP server)      
noninteractive commands      
noninteractive commands, invoking securely on remote machine      
nonstandard, used by network protocols      
NOPASSWD tag (sudo command)      
nosuid option      
notice priority, system messages      
no_access keyword, xinetd.conf      
null-terminated filenames      
observing network traffic      
observing network traffic with      
observing via GUI      
obtaining and listing for users      
obtaining from keyserver and verifying      
obtaining keys from
obtaining keys from keyserver
of backups      
official web site
on mail servers      
on multiple systems      
on specific protocols      
onerr keyword (PAM, listfile module)
onerr keyword, PAM listfile module      
only_from and no_access keywords      
only_from and no_access keywords, xinetd.conf      
open network ports, testing for      
open ports not protected by, finding with nmap
open relay mail servers
open server, testing for exploitation as a proxy
open servers, testing FTP server for possible exploitation as a proxy      
open-source integrity checkers      [See Tripwire]
openlog function
OpenSSH      [See SSH]
OpenSSH client, using ~/.ssh file instead of
OpenSSH programs for creating/using
OpenSSL      
Openwall Project, John the Ripper
Operating System      2nd
operating system fingerprints      
operating system vulnerabilities      
operating system vulnerability to forged connections
options for remote file copying      
outgoing network connections      [See networks protecting
owned by others, examination by superuser      
Ownership, file      
packet filtering
packet list window      
packet sniffers
packet sniffers and
packet sniffing with      
packet sniffing with Snort      
packet-sniffing programs, running as
packets, refusing with DROP or REJECT
PAM      
PAM (pluggable authentication modules)      [See PAM]
PAM modules
PAM modules, debugging      
PAM modules, error messages      
PAM, enforcing password strength requirements      
PAM, using with      
pam_stack      
pam_stack module      
partitioning into separate files      
partitioning logs into files      
partitioning logs into separate files      
passphrase for private key      
passphrases      
passwd file, DES-based crypt( ) hashes in      
passwd program      
password changes      
password changes, authorizing via      
Passwords      
passwords captured from sessions with dsniff      
PATH environment variable, splitting with Perl script      
pathnames      
Paths      
Pattern matching      [See regular expressions]
payload display      
payload, observing      
PEM encoding, converting DER certificate to
PEM format (certificates)
performance and      
performance, effects of promiscuous mode
period (.), in search path
Perl      
Perl scripts      
permission bits, ignoring
PERMISSIONS      [See permissions]
permissions for directory
Permissions, examining
PermitRootLogin (sshd_config)      
PermitRootLogin, setting      
permitting incoming SSH access only
permitting only incoming access via SSH with firewall
permitting SSH access only
per_source keyword (xinetd)      
PGP (Pretty Good Privacy)
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте