Chapter 14. Preparing Your Configuration

   


In Part I, we looked at the many parts of system configuration that must be done correctly to secure a system. We looked at the human factors of password selection, policies, and procedures. Recent security bugs in critical programs and recent exploits were examined. Some case studies were made. Lastly, we hardened our system some more. Now, let us prepare for war!

The topics covered in this chapter include:

  • "TCP Wrappers" on page 555

  • "Adaptive Firewalls: Raising the Drawbridge with the Cracker Trap" on page 559

  • "Ending Cracker Servers with a Kernel Mod" on page 580

  • "Fire Drills" on page 582

  • "Break into Your Own System with Tiger Teams" on page 588


   
Top


Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Real World Linux Security Prentice Hall Ptr Open Source Technology Series
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 260

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net