Flylib.com
Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Hacker Linux Uncovered
Back Cover
About
Preface
Acknowledgments
Chapter 1: Introduction
1.1. Hacker Attacks
1.2. What is Linux?
1.3. Is Open-Source Code Secure?
1.4. The Kernel
1.5. Distributions
Chapter 2: Linux Installation and Initial Configuration
2.1. Preparing to Install
2.2. Starting the Installation
2.3. Disk Partitioning
2.4. Boot Loader
2.5. Network Configuration
2.6. Root Password
2.7. Installing Packages
2.8. First Boot
2.9. Moving Around the System
2.10. Help
2.11. Configuration Basics
Chapter 3: Welcome to Linux
3.1. Linux File Systems
3.2. System Boot
3.3. User Registration
3.4. Linux Processes
3.5. Task Scheduling
3.6. Network Configuration
3.7. Connecting to the Internet
3.8. Updating the Kernel
Chapter 4: Access Control
4.1. Access Rights
4.2. Group Management
4.3. Managing Users
4.4. Typical Rights-Assignment Mistakes
4.5. Privileged Programs
4.6. Additional Protection Features
4.7. Protecting Services
4.8. Obtaining Root Privileges
4.9. Expanding Access Permission
4.10. Firewalls
4.11. The ipchains Program
4.12. The iptables Program
4.13. Notes on Firewall Operation
4.14. Prohibiting and Permitting Hosts
4.15. Advice on Configuring a Firewall
4.16. Obtaining Higher Privileges
Chapter 5: Administration
5.1. Useful Commands
5.2. Encryption
5.3. SSH Protocol
5.4. The inetdxinetd Daemon
Chapter 6: Samba Style
6.1. Configuring Samba
6.2. Describing Objects
6.3. Managing Users
6.4. Using Samba
Chapter 7: Web Server
7.1. Main Settings
7.2. Modules
7.3. Access Rights
7.4. Creating Virtual Web Servers
7.5. Security Notes
7.6. The Convenience Factor
7.7. Securing Scripts
7.8. Web Page Indexing
7.9. Securing the Connection
Chapter 8: Electronic Mail
8.1. Configuring Sendmail
8.2. Mail Operation
8.3. Useful Commands
8.4. Sendmail Security
8.5. Mail Bombing
8.6. Spam
8.7. Conclusion
Chapter 9: Gateway to Internet
9.1. Gateway Configuration
9.2. Proxy Server Operation
9.3. Squid
9.4. Squid Access Rights
9.5. Working with Squid
9.6. Browser Caching
Chapter 10: File Transfer
10.1. FTP Operation
10.2. Configuring the wu-ftp Server
10.3. Main Settings of the wu-ftp Server
10.4. Creating Virtual Servers
10.5. Additional Settings
10.6. Guest Accounts
10.7. FTP Server Security
10.8. Supplementary Information
10.9. Summary
Chapter 11: Network Addressing
11.1. Introduction to DNS
11.2. Local Hosts File
11.3. External DNS Servers
11.4. Configuring DNS
11.5. Zone-Description Files
11.6. Reverse Zone
11.7. DNS Security
Chapter 12: System Monitoring
12.1. Automated Security Monitoring
12.2. Shutting SUID and SGID Doors
12.3. Testing the Configuration
12.4. Detecting Attacks
12.5. Logging
12.6. Handling Logs
12.7. Log Security
12.8. Network Security
Chapter 13: Backing Up and Restoring Data
13.1. Backup Fundamentals
13.2. Constant Availability
13.3. Saving Backup Copies
13.4. Backup Policy
13.5. Backup Capabilities in Linux
13.6. Securing Backup Media
Chapter 14: Advice from a Hacker
14.1. Security Fundamentals
14.2. Buffer Overflow
14.3. Rootkits
14.4. Back Doors
14.5. Monitoring Traffic
14.6. DoS and DDoS Attacks
14.7. Penetration through Trusted Systems
14.8. Dangerous Network File System
14.9. Detecting Break-ins
14.10. Cracking Passwords
14.11. Tuning Linux
14.12. Miscellaneous Recommendations
14.13. You ve Been Hacked
Part 1: Appendixes
Appendix 1: FTP Commands
Appendix 2: Useful Programs
Appendix 3: Internet Resources
Conclusion
List of Figures
List of Tables
List of Listings
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Qshell for iSeries
The Exit Status and Decision-Making
Functions
Archives and Compression
Writing Programs for Qshell
Java Development Tools
SQL Hacks
Hack 10. Convert Subqueries to JOINs
Hack 27. Identify Overlapping Ranges
Hack 51. Display Rows As Columns
Hack 58. Store Parameters in the Database
Reporting
Microsoft VBScript Professional Projects
Procedures
Arrays
Project Case Study Desktop Customization and Deployment
Building the Web Sites Main Page
Appendix A Windows XP Command Reference
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Project Closing
Answers and Explanations
Appendix A. CD Contents and Installation Instructions
Junos Cookbook (Cookbooks (OReilly))
Configuring the Router from the CLI
Managing Redundant Routing Engines
Setting an IP Address for the Router
Introduction
Tracing PIM Packets
Cultural Imperative: Global Trends in the 21st Century
Cross-Century Worldviews
The China Phenomenon
Americanization versus Asianization
Empires Past, Present, and Future
Epilogue After September 11
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies