List of Tables

   


Table 2.1 Most Frequent Linux Break-Ins

Table 2.2 Meaning of TCP Status Bits

Table 2.3 Dangerous Services

Table 2.4 Sendmail DoS Fortification

Table 3.1 NIC drivers supporting changeable MACs

Table 3.2 NIC drivers not supporting changeable MACs

Table 4.1 Sendmail Security Options

Table 4.2 /etc/mail/access Instructions

Table 4.3 Services Squid Allows by Default

Table 5.1 Linux/UNIX Diagnostic Services

Table 6.1 Dangerous Netscape Applications

Table 6.2 Recommended Device Permissions

Table 6.3 Dangerous CGI Input Characters

Table 11.1 Promiscuous Variations

Table 12.1 Private Network Numbers

Table 12.2 Common ICMP Packet Types

Table 12.3 Types of Packet Service

Table 12.4 Private Network Numbers

Table 12.5 Common ICMP Packet Types

Table 12.6 Types of Packet Service

Table 12.7 Variables in rc.fw

Table 12.8 Basic Firewall Rules

Table 17.1 Web Site Defacements (per year)

Table C.1 Port Number Ranges

Table C.2 Well-Known Port Numbers

Table C.3 Registered Port Numbers

Table D.1 Danger Levels


   
Top


Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Real World Linux Security Prentice Hall Ptr Open Source Technology Series
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 260

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net