Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux Security Cookbook

Авторы: Barrett D.J., Byrnes R.G., Silverman R.

Аннотация:

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.


Язык: en

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 332

Добавлена в каталог: 02.08.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Linux machine acting as      
Linux recording of for each user      
Linux shell scripts in      
Linux, website for      
Linux-PAM, web site      
ListenAddress statements, adding      
ListenAddress statements, adding to sshd_config      
listfile      2nd
listfile module (PAM)      
listing      
listing all files      
listing all sudo invocation attempts      
listing firewall rules      
listing for GnuPG      
listing invocations      
listing network interfaces      
listing permissible commands for root privileges      
listing scripts only      
listing with klist command      
loading at boot time      
loading configuration      
loading firewall configuration      
loading firewall rules at boot time      
local acces, permitting while blocking remote access      
local activities, examining      
local facilities (system messages)      
local filesystems, searching      
local key (Tripwire)      
local mail (acceptance by SMTP server)      
local network activities      
local password authentication, using Kerberos with PAM      
local vs. remote filesystems      
local, authentication via (Kerberos with PAM)      
localhost      
log files      
log files created by, permissions and      
log files, combining      
logfile group configuration file      
logfile group configuration file (logwatch)      
logger program      
logging      
logging access to services      
logging and dropping certain packets      
logging into remote host      
logging messages remotely      
logging output      
logging remotely      
logging Snort data to libpcap-format files      
loghost      
login information about, printing      
login passwords      
login shells, root      
login, testing for strength      
Logins      
logins and passwords      
logins, preventing on terminal devices      
logouts, history of all on system      
logrotate program      2nd 3rd
LogWatch      
logwatch filter for services not supported      
logwatch, designing for      
looking for      
looking up      
lsh (SSH implementation)      
lsof command      
lsof command, examining processes      
lsof command, investigating processes with      
m4 macro processor      
MAC      
MAC addresses      
Mail      [See email IMAP POP]
Mail application (Mozilla)      
mail clients      
mail delivery with      
mail facility (system messages)      
mail server support for SSL      
mail server, running with      
mail server, running with SSL      
mail servers      
mail servers (IMAP/POP), protection by SSL      
mail session security      
mail sessions for Evolution      
mail, receiving mail without running      
Mailcrypt      
Mailcrypt package      [See Mailcrypt]
Mailcrypt package, using with GnuPG      
Mailcrypt, using with      
mailpgp (script for encrypting/sending email)      
mailsnarf command      
maintaining encrypted files      
maintaining encrypted files with vim      
malicious program, /tmp/ls      
man-in-the-middle (MITM)      
Man-in-the-middle (MITM) attacks      
man-in-the-middle attacks, risk of      
manual      
manual integrity checks      
manual integrity checks, running with      
manual integrity checks, using instead of      
marking files for inclusion or exclusion from Tripwire database      
mask format, CIDR      
Massachusetts Institute of Technology (MIT) Kerberos      
master password for KDC database      
matching a filter expression, searching network traffic for      
matching anything (ALL keyword)      2nd
matching with fgrep command      
max_load keyword (xinetd)      2nd
mc-deactivate-passwd to force passphrase erasure      
mc-encrypt function      
MD5 checksum      
MD5-hashed passwords stored in shadow file (v. 8.0)      
measuring for operating systems      
merging lastlog databases from several systems      
merging log files      
merging system log files      
MH (mail handler)      
MH, integrating with      
mirroring a set of files securely between machines      
mirroring set of files securely between computers      
MIT Kerberos      
MIT Kerberos-5      
MITM      [See man-in-the-middle attacks]
modifying      
modifying KDC database for      
modifying KDC database for host      
modifying to invoke tcpd      
modifying to invoke tcpd in /etc/xinetd.d startup file      
Modules      
monitoring and intrusion detection      [See intrusion detection for networks monitoring systems for suspicious activity]
monitoring login activity      
monitoring suspicious activity      
monitoring systems for suspicious activity      
monitoring tools for networks      
monitoring traffic on      
morepgp (script for decrypting/reading email)      
mount command      
mounted, listing in /proc/mounts      
mounts file (/proc)      
Mozilla      
Muffet, Alec (Crack utility)      
multi-homed hosts      
multi-homed server machines, socket mail server is listening on      
multicast packets      
multiple root accounts      
multiple systems, monitoring problems with      
multithreaded services (in inetd.conf)      
mutation in attacks against protocols      
mutt client connection over IMAP, testing      
mutt mail client, use of      
mutt mail client, using with      
mutt mailer      
mutt mailer, using with      
name-of-source and name-of-destination      
NAMEINARGS flag for xinetd      
NAT gateway, canonical client hostname and      
National Infrastructure Protection Center (NIPC) (U.S.)      
National Institutes of Health, ONetwork and Network Monitoring SoftwareO page      
native support by Mozilla      
nc command      
nc command, using      
netgroups      
Netscape, certificate storage      
netstat command      
network (/etc/init.d startup file)      
network access control      
network configuration of your systems, attack vulnerability and      
network connections for all      
network connections for processes, listing      
network filesystems      
network interfaces      
Network Intrusion Detection System (NIDS)      
network intrusion detection systems (NIDS)      
network monitoring tools      
network protocols, detecting insecure      
network script      
network services, access control facilities      
network switches, packet sniffers and      
network trace files, ngrep      
network, detecting insecure      
network-intrusion detection with Snort      2nd
Networking      
networking, important files for (/proc/net/tcp and /proc/net/udp)      
networks      
new host, adding to KDC database      
Newsgroups application (Mozilla)      
NFS      [See network filesystems]
ngrep program      
ngrep, finding strings in network traffic      
ngrep, using for      
NIDS      [See network intrusion detection systems Snort]
NIH page      
nmap -O command      
nmap -o options, formats of      
nmap command      
nmap command, port scanning capabilities      
nmap command, using for      
nmap port scan detected      
nmap, use of TCP and ICMP pings for host discovery      
nmapfe program      2nd
nmh (mail handler)      
NNTP, tunneling with SSH      2nd
nodev option to prohibit device special files      
noexec option      
non-local mail (acceptance by SMTP server)      
noninteractive commands      
noninteractive commands, invoking securely on remote machine      
nonstandard, used by network protocols      
NOPASSWD tag (sudo command)      
nosuid option      
notice priority, system messages      
no_access keyword, xinetd.conf      
null-terminated filenames      
observing network traffic      
observing network traffic with      
observing via GUI      
obtaining and listing for users      
obtaining from keyserver and verifying      
obtaining keys from      
obtaining keys from keyserver      
of backups      
official web site      
on mail servers      
on multiple systems      
on specific protocols      
onerr keyword (PAM, listfile module)      
onerr keyword, PAM listfile module      
only_from and no_access keywords      
only_from and no_access keywords, xinetd.conf      
open network ports, testing for      
open ports not protected by, finding with nmap      
open relay mail servers      
open server, testing for exploitation as a proxy      
open servers, testing FTP server for possible exploitation as a proxy      
open-source integrity checkers      [See Tripwire]
openlog function      
OpenSSH      [See SSH]
OpenSSH client, using ~/.ssh file instead of      
OpenSSH programs for creating/using      
OpenSSL      
Openwall Project, John the Ripper      
Operating System      2nd
operating system fingerprints      
operating system vulnerabilities      
operating system vulnerability to forged connections      
options for remote file copying      
outgoing network connections      [See networks protecting
owned by others, examination by superuser      
Ownership, file      
packet filtering      
packet list window      
packet sniffers      
packet sniffers and      
packet sniffing with      
packet sniffing with Snort      
packet-sniffing programs, running as      
packets, refusing with DROP or REJECT      
PAM      
PAM (pluggable authentication modules)      [See PAM]
PAM modules      
PAM modules, debugging      
PAM modules, error messages      
PAM, enforcing password strength requirements      
PAM, using with      
pam_stack      
pam_stack module      
partitioning into separate files      
partitioning logs into files      
partitioning logs into separate files      
passphrase for private key      
passphrases      
passwd file, DES-based crypt( ) hashes in      
passwd program      
password changes      
password changes, authorizing via      
Passwords      
passwords captured from sessions with dsniff      
PATH environment variable, splitting with Perl script      
pathnames      
Paths      
Pattern matching      [See regular expressions]
payload display      
payload, observing      
PEM encoding, converting DER certificate to      
PEM format (certificates)      
performance and      
performance, effects of promiscuous mode      
period (.), in search path      
Perl      
Perl scripts      
permission bits, ignoring      
PERMISSIONS      [See permissions]
permissions for directory      
Permissions, examining      
PermitRootLogin (sshd_config)      
PermitRootLogin, setting      
permitting incoming SSH access only      
permitting only incoming access via SSH with firewall      
permitting SSH access only      
per_source keyword (xinetd)      
PGP (Pretty Good Privacy)      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте