Table 2.1 Most Frequent Linux Break-Ins
Table 2.2 Meaning of TCP Status Bits
Table 2.3 Dangerous Services
Table 2.4 Sendmail DoS Fortification
Table 3.1 NIC drivers supporting changeable MACs
Table 3.2 NIC drivers not supporting changeable MACs
Table 4.1 Sendmail Security Options
Table 4.2 /etc/mail/access Instructions
Table 4.3 Services Squid Allows by Default
Table 5.1 Linux/UNIX Diagnostic Services
Table 6.1 Dangerous Netscape Applications
Table 6.2 Recommended Device Permissions
Table 6.3 Dangerous CGI Input Characters
Table 11.1 Promiscuous Variations
Table 12.1 Private Network Numbers
Table 12.2 Common ICMP Packet Types
Table 12.3 Types of Packet Service
Table 12.4 Private Network Numbers
Table 12.5 Common ICMP Packet Types
Table 12.6 Types of Packet Service
Table 12.7 Variables in rc.fw
Table 12.8 Basic Firewall Rules
Table 17.1 Web Site Defacements (per year)
Table C.1 Port Number Ranges
Table C.2 Well-Known Port Numbers
Table C.3 Registered Port Numbers
Table D.1 Danger Levels