Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux Security Cookbook

Авторы: Barrett D.J., Byrnes R.G., Silverman R.

Аннотация:

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.


Язык: en

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 332

Добавлена в каталог: 02.08.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Telnet, disabling standard
Telnet, using with
telnetd, configuring to require strong authentication
Terminals
terminating on logout
terminating SSH agent on logout
testing and monitoring
testing and monitoring on system      
Testing configuration
testing firewall configuration      
testing for open      
testing for open port
testing for open ports      
testing for vulnerabilities of specific network services      
testing of pre-installed trusted certificates by Evolution      
testing passwords for strength      
testing port by trying to connect with Telnet      
testing server with nmap -I for security      
testing SSL connection locally      
testing SSL connection to POP/IMAP server      
testing SSL connection to server      
testing SSL mail connection      
testing systems for security holes      [See monitoring systems for suspicious activity]
testing TCP port by trying to connect
testing use in pine mail client
testing with nmap stealth operations      
tethereal
tethereal (text version)
text editors, using encryption features for email
text-based certificate format      [See PEM format]
that use RPC services, examining with losf +M
Thawte (Certifying Authority)
threading, listing for new service in inetd.conf      
tickets, Kerberos
Ticks      
time of day, restricting service access by      
Timestamps
timestamp_timeout variable
TLS (Transport Layer Security)      [See SSL]
to binary files
to server executable (inetd.conf)      
tool to follow TCP stream      
Tracing
tracing configuration errors in
tracing network system calls      
tracing processes
tracing system calls      2nd
transferring email from another ISP over tunnel
transferring your email from another ISP with SSH
Transport Layer Security (TLS)      [See SSL]
tree view window
Tripwire      
Trojan horses      
trust, web of
Trusted certificates
trusted public keys (GnuPG)
trusted, authenticating by      [See trusted-host authentication]
trusted-host authentication      
tty item (PAM)      
Tunneling
tunneling NNTP with
tunneling session through SSH
tunneling TCP connection through
tunneling TCP connection through SSH
tunneling TCP session through SSH
twcfg.txt file      
twinstall.sh script      
twinstall.sh script (Tripwire)      
twpol.txt file      
twprint program
UDP
UDP ports, problems with
umask
umask command      
unauthorized attempts to invoke, listing      
unauthorized sudo attempts, listing
unconfigured interface for stealth sniffer      
unicast packets
unique identifier for GnuPG keys      
unique identifier for keys
unsecured connections, permitting
unsecured IMAP connections
unsecured mail sessions from
unshadow command
updating to ignore discrepancies
upgrading and tuning ruleset      
uploading new signatures to
uploading new signatures to keyserver
uploading new to keyserver
urlsnarf command
urlsnarf, use with
Usenet news, tunneling NNTP connections through SSH
user (inetd.conf file)      
user accounts
user administration of their own machines (not others)
user authorization privileges, allowing per host
user authorization to kill certain processes      
user facility, system messages
user ID of zero (0) (superuser)
usernames in remote file copying
usernames in trusted-host authentication
users      
users, adding to existing realm
using domain name in Kerberos realm name
using in C program      
using instead of IP addresses in firewall rules      
using libnids to reassemble      
using rsync instead of      
using server from arbitrary clients      
using with Ethereal      
using with forced command      
using with GnuPG
using with inetd
using with inetd to restrict remote host access
using with libwrap      
using with Pine
using with rsync to mirror set of files between computers      
using with tcpd      
using with tcpdump      
using with xinetd      
validating      
validating a certificate      
validating SSL certificates in      
validation of passwords, controlling with PAM      
variables (Mailcrypt), listing all      
verifying      2nd
verifying connection to secure POP or IMAP server      
verifying for keys imported from keyserver      
verifying for RPM-installed files      
verifying on downloaded software      
verifying RPM-installed files      
verifying secure mail traffic      
verifying signatures on downloaded software
Verisign (Certifying Authority)      
Verisign, Thawte, and Equifax      
VFAT filesystems, checking integrity of
via Kerberos      
via multiple superuser accounts      
via SSH      
via SSH (without revealing password)
via xinetd      
viewing keys on      
viewing keys on keyring      
viewing on GnuPG keyring      
viewing rules with      
vim editor      
vim mail editor, composing encrypted email with      
violations (unexpected changes) in system files
visudo program, editing sudoers file
vulnerability to attacks      
vulnerability to attacks and
vulnerability to using REJECT      
vulnerability to, factors in      
weak authorization controls      
weak controls in trusted-host authentication      
weaknesses      
web of trust      
web page for this book      
web page information on
web servers, blocking outgoing access to all on a network
Web site
web site (MIT)      
web site information on      
web site, blocking outgoing traffic to      
Web-based mail packages      
Website      
website information on      
well-known ports, scanning with nmap      
whois command      
wildcard expansion (shell-style)      
Windows filesystems (VFAT)      
Windows VFAT filesystems, instructing Tripwire not to compare      
Windows VFAT, checking integrity of      
with C      
with elm      
with Emacs      
with Ethereal GUI      
with Evolution      
with MH      
with mutt      
with password      
with Perl scripts      
with pidof command      
with Pine      
with pine mail client      
with SSH      
with SSH and Pine      
with ssh, mirroring set of files securely between machines      
with ssh-agent      
with SSL      
with SSL and Evolution      
with SSL and mutt      
with SSL and Pine      
with SSL and stunnel      
with stunnel and SSL      
with sudo command      
with vim      
without a password, finding      
without passwords      
wordlist directive      
world-writable files access, disabling      
world-writable files and directories, finding      
world-writable files, finding and fixing      
world-writable, finding      
worms, testing for with chkrootkit      
writable files, finding      
writing alerts to file instead of syslog      
writing system log entries      
writing system log entries via shell scripts and syslog API      
writing to system log from      2nd
wtmp file      
www services, protecting dedicated server for      
X Window System      
X windows DISPLAY and XAUTHORITY, setting      
X.509 certificates      
X11Forwarding setting      
xargs program      
XAUTHORITY environment variable (X windows)      
Ximian, Evolution mailer      
xinetd      [See xinetd]
xinetd with tcpd      
xinetd, logging to      
xinetd.conf file      
XML::Simple      
XML::Simple module (Perl)      
~/.ssh directory, creating and setting mode      
~/.ssh file, using instead of      
~/.ssh/config file      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте