Flylib.com
Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Hacker Linux Uncovered
Back Cover
About
Preface
Acknowledgments
Chapter 1: Introduction
1.1. Hacker Attacks
1.2. What is Linux?
1.3. Is Open-Source Code Secure?
1.4. The Kernel
1.5. Distributions
Chapter 2: Linux Installation and Initial Configuration
2.1. Preparing to Install
2.2. Starting the Installation
2.3. Disk Partitioning
2.4. Boot Loader
2.5. Network Configuration
2.6. Root Password
2.7. Installing Packages
2.8. First Boot
2.9. Moving Around the System
2.10. Help
2.11. Configuration Basics
Chapter 3: Welcome to Linux
3.1. Linux File Systems
3.2. System Boot
3.3. User Registration
3.4. Linux Processes
3.5. Task Scheduling
3.6. Network Configuration
3.7. Connecting to the Internet
3.8. Updating the Kernel
Chapter 4: Access Control
4.1. Access Rights
4.2. Group Management
4.3. Managing Users
4.4. Typical Rights-Assignment Mistakes
4.5. Privileged Programs
4.6. Additional Protection Features
4.7. Protecting Services
4.8. Obtaining Root Privileges
4.9. Expanding Access Permission
4.10. Firewalls
4.11. The ipchains Program
4.12. The iptables Program
4.13. Notes on Firewall Operation
4.14. Prohibiting and Permitting Hosts
4.15. Advice on Configuring a Firewall
4.16. Obtaining Higher Privileges
Chapter 5: Administration
5.1. Useful Commands
5.2. Encryption
5.3. SSH Protocol
5.4. The inetdxinetd Daemon
Chapter 6: Samba Style
6.1. Configuring Samba
6.2. Describing Objects
6.3. Managing Users
6.4. Using Samba
Chapter 7: Web Server
7.1. Main Settings
7.2. Modules
7.3. Access Rights
7.4. Creating Virtual Web Servers
7.5. Security Notes
7.6. The Convenience Factor
7.7. Securing Scripts
7.8. Web Page Indexing
7.9. Securing the Connection
Chapter 8: Electronic Mail
8.1. Configuring Sendmail
8.2. Mail Operation
8.3. Useful Commands
8.4. Sendmail Security
8.5. Mail Bombing
8.6. Spam
8.7. Conclusion
Chapter 9: Gateway to Internet
9.1. Gateway Configuration
9.2. Proxy Server Operation
9.3. Squid
9.4. Squid Access Rights
9.5. Working with Squid
9.6. Browser Caching
Chapter 10: File Transfer
10.1. FTP Operation
10.2. Configuring the wu-ftp Server
10.3. Main Settings of the wu-ftp Server
10.4. Creating Virtual Servers
10.5. Additional Settings
10.6. Guest Accounts
10.7. FTP Server Security
10.8. Supplementary Information
10.9. Summary
Chapter 11: Network Addressing
11.1. Introduction to DNS
11.2. Local Hosts File
11.3. External DNS Servers
11.4. Configuring DNS
11.5. Zone-Description Files
11.6. Reverse Zone
11.7. DNS Security
Chapter 12: System Monitoring
12.1. Automated Security Monitoring
12.2. Shutting SUID and SGID Doors
12.3. Testing the Configuration
12.4. Detecting Attacks
12.5. Logging
12.6. Handling Logs
12.7. Log Security
12.8. Network Security
Chapter 13: Backing Up and Restoring Data
13.1. Backup Fundamentals
13.2. Constant Availability
13.3. Saving Backup Copies
13.4. Backup Policy
13.5. Backup Capabilities in Linux
13.6. Securing Backup Media
Chapter 14: Advice from a Hacker
14.1. Security Fundamentals
14.2. Buffer Overflow
14.3. Rootkits
14.4. Back Doors
14.5. Monitoring Traffic
14.6. DoS and DDoS Attacks
14.7. Penetration through Trusted Systems
14.8. Dangerous Network File System
14.9. Detecting Break-ins
14.10. Cracking Passwords
14.11. Tuning Linux
14.12. Miscellaneous Recommendations
14.13. You ve Been Hacked
Part 1: Appendixes
Appendix 1: FTP Commands
Appendix 2: Useful Programs
Appendix 3: Internet Resources
Conclusion
List of Figures
List of Tables
List of Listings
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
WebLogic: The Definitive Guide
Getting Started
EJB QL
Packaging
Reliable SOAP Messaging
Generating Log Messages
The Complete Cisco VPN Configuration Guide
ISAKMP/IKE Phase 2
Bandwidth Management
IPsec Connections
Authentication and Connection Options
Summary
Mastering Delphi 7
Core Library Classes
Modeling and OOP Programming (with ModelMaker)
Client/Server with dbExpress
Multitier DataSnap Applications
Web Programming with IntraWeb
Special Edition Using Crystal Reports 10
Learning to Sort Records
Creating and Implementing Parameters Fields
Delivering Reports Using the Report Viewer
Scheduling to a Destination
Appendix A. Using Sql Queries In Crystal Reports
Java All-In-One Desk Reference For Dummies
Welcome to Java
Working with Variables and Data Types
Programming Threads
Choosing from a List
Creating Servlets
Understanding Digital Signal Processing (2nd Edition)
THE COMMUTATIVE PROPERTY OF LINEAR TIME-INVARIANT SYSTEMS
AN INTRODUCTION TO INFINITE IMPULSE RESPONSE FILTERS
REFERENCES
SINGLE TONE DETECTION
Appendix C. Time Reversal and the DFT
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies