Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Linux Security Cookbook

Авторы: Barrett D.J., Byrnes R.G., Silverman R.

Аннотация:

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.


Язык: en

Рубрика: Руководства по программному обеспечению/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 332

Добавлена в каталог: 02.08.2006

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Telnet, disabling standard      
Telnet, using with      
telnetd, configuring to require strong authentication      
Terminals      
terminating on logout      
terminating SSH agent on logout      
testing and monitoring      
testing and monitoring on system      
Testing configuration      
testing firewall configuration      
testing for open      
testing for open port      
testing for open ports      
testing for vulnerabilities of specific network services      
testing of pre-installed trusted certificates by Evolution      
testing passwords for strength      
testing port by trying to connect with Telnet      
testing server with nmap -I for security      
testing SSL connection locally      
testing SSL connection to POP/IMAP server      
testing SSL connection to server      
testing SSL mail connection      
testing systems for security holes      [See monitoring systems for suspicious activity]
testing TCP port by trying to connect      
testing use in pine mail client      
testing with nmap stealth operations      
tethereal      
tethereal (text version)      
text editors, using encryption features for email      
text-based certificate format      [See PEM format]
that use RPC services, examining with losf +M      
Thawte (Certifying Authority)      
threading, listing for new service in inetd.conf      
tickets, Kerberos      
Ticks      
time of day, restricting service access by      
Timestamps      
timestamp_timeout variable      
TLS (Transport Layer Security)      [See SSL]
to binary files      
to server executable (inetd.conf)      
tool to follow TCP stream      
Tracing      
tracing configuration errors in      
tracing network system calls      
tracing processes      
tracing system calls      2nd
transferring email from another ISP over tunnel      
transferring your email from another ISP with SSH      
Transport Layer Security (TLS)      [See SSL]
tree view window      
Tripwire      
Trojan horses      
trust, web of      
Trusted certificates      
trusted public keys (GnuPG)      
trusted, authenticating by      [See trusted-host authentication]
trusted-host authentication      
tty item (PAM)      
Tunneling      
tunneling NNTP with      
tunneling session through SSH      
tunneling TCP connection through      
tunneling TCP connection through SSH      
tunneling TCP session through SSH      
twcfg.txt file      
twinstall.sh script      
twinstall.sh script (Tripwire)      
twpol.txt file      
twprint program      
UDP      
UDP ports, problems with      
umask      
umask command      
unauthorized attempts to invoke, listing      
unauthorized sudo attempts, listing      
unconfigured interface for stealth sniffer      
unicast packets      
unique identifier for GnuPG keys      
unique identifier for keys      
unsecured connections, permitting      
unsecured IMAP connections      
unsecured mail sessions from      
unshadow command      
updating to ignore discrepancies      
upgrading and tuning ruleset      
uploading new signatures to      
uploading new signatures to keyserver      
uploading new to keyserver      
urlsnarf command      
urlsnarf, use with      
Usenet news, tunneling NNTP connections through SSH      
user (inetd.conf file)      
user accounts      
user administration of their own machines (not others)      
user authorization privileges, allowing per host      
user authorization to kill certain processes      
user facility, system messages      
user ID of zero (0) (superuser)      
usernames in remote file copying      
usernames in trusted-host authentication      
users      
users, adding to existing realm      
using domain name in Kerberos realm name      
using in C program      
using instead of IP addresses in firewall rules      
using libnids to reassemble      
using rsync instead of      
using server from arbitrary clients      
using with Ethereal      
using with forced command      
using with GnuPG      
using with inetd      
using with inetd to restrict remote host access      
using with libwrap      
using with Pine      
using with rsync to mirror set of files between computers      
using with tcpd      
using with tcpdump      
using with xinetd      
validating      
validating a certificate      
validating SSL certificates in      
validation of passwords, controlling with PAM      
variables (Mailcrypt), listing all      
verifying      2nd
verifying connection to secure POP or IMAP server      
verifying for keys imported from keyserver      
verifying for RPM-installed files      
verifying on downloaded software      
verifying RPM-installed files      
verifying secure mail traffic      
verifying signatures on downloaded software      
Verisign (Certifying Authority)      
Verisign, Thawte, and Equifax      
VFAT filesystems, checking integrity of      
via Kerberos      
via multiple superuser accounts      
via SSH      
via SSH (without revealing password)      
via xinetd      
viewing keys on      
viewing keys on keyring      
viewing on GnuPG keyring      
viewing rules with      
vim editor      
vim mail editor, composing encrypted email with      
violations (unexpected changes) in system files      
visudo program, editing sudoers file      
vulnerability to attacks      
vulnerability to attacks and      
vulnerability to using REJECT      
vulnerability to, factors in      
weak authorization controls      
weak controls in trusted-host authentication      
weaknesses      
web of trust      
web page for this book      
web page information on      
web servers, blocking outgoing access to all on a network      
Web site      
web site (MIT)      
web site information on      
web site, blocking outgoing traffic to      
Web-based mail packages      
Website      
website information on      
well-known ports, scanning with nmap      
whois command      
wildcard expansion (shell-style)      
Windows filesystems (VFAT)      
Windows VFAT filesystems, instructing Tripwire not to compare      
Windows VFAT, checking integrity of      
with C      
with elm      
with Emacs      
with Ethereal GUI      
with Evolution      
with MH      
with mutt      
with password      
with Perl scripts      
with pidof command      
with Pine      
with pine mail client      
with SSH      
with SSH and Pine      
with ssh, mirroring set of files securely between machines      
with ssh-agent      
with SSL      
with SSL and Evolution      
with SSL and mutt      
with SSL and Pine      
with SSL and stunnel      
with stunnel and SSL      
with sudo command      
with vim      
without a password, finding      
without passwords      
wordlist directive      
world-writable files access, disabling      
world-writable files and directories, finding      
world-writable files, finding and fixing      
world-writable, finding      
worms, testing for with chkrootkit      
writable files, finding      
writing alerts to file instead of syslog      
writing system log entries      
writing system log entries via shell scripts and syslog API      
writing to system log from      2nd
wtmp file      
www services, protecting dedicated server for      
X Window System      
X windows DISPLAY and XAUTHORITY, setting      
X.509 certificates      
X11Forwarding setting      
xargs program      
XAUTHORITY environment variable (X windows)      
Ximian, Evolution mailer      
xinetd      [See xinetd]
xinetd with tcpd      
xinetd, logging to      
xinetd.conf file      
XML::Simple      
XML::Simple module (Perl)      
~/.ssh directory, creating and setting mode      
~/.ssh file, using instead of      
~/.ssh/config file      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте