Flylib.com
Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Hacker Linux Uncovered
Back Cover
About
Preface
Acknowledgments
Chapter 1: Introduction
1.1. Hacker Attacks
1.2. What is Linux?
1.3. Is Open-Source Code Secure?
1.4. The Kernel
1.5. Distributions
Chapter 2: Linux Installation and Initial Configuration
2.1. Preparing to Install
2.2. Starting the Installation
2.3. Disk Partitioning
2.4. Boot Loader
2.5. Network Configuration
2.6. Root Password
2.7. Installing Packages
2.8. First Boot
2.9. Moving Around the System
2.10. Help
2.11. Configuration Basics
Chapter 3: Welcome to Linux
3.1. Linux File Systems
3.2. System Boot
3.3. User Registration
3.4. Linux Processes
3.5. Task Scheduling
3.6. Network Configuration
3.7. Connecting to the Internet
3.8. Updating the Kernel
Chapter 4: Access Control
4.1. Access Rights
4.2. Group Management
4.3. Managing Users
4.4. Typical Rights-Assignment Mistakes
4.5. Privileged Programs
4.6. Additional Protection Features
4.7. Protecting Services
4.8. Obtaining Root Privileges
4.9. Expanding Access Permission
4.10. Firewalls
4.11. The ipchains Program
4.12. The iptables Program
4.13. Notes on Firewall Operation
4.14. Prohibiting and Permitting Hosts
4.15. Advice on Configuring a Firewall
4.16. Obtaining Higher Privileges
Chapter 5: Administration
5.1. Useful Commands
5.2. Encryption
5.3. SSH Protocol
5.4. The inetdxinetd Daemon
Chapter 6: Samba Style
6.1. Configuring Samba
6.2. Describing Objects
6.3. Managing Users
6.4. Using Samba
Chapter 7: Web Server
7.1. Main Settings
7.2. Modules
7.3. Access Rights
7.4. Creating Virtual Web Servers
7.5. Security Notes
7.6. The Convenience Factor
7.7. Securing Scripts
7.8. Web Page Indexing
7.9. Securing the Connection
Chapter 8: Electronic Mail
8.1. Configuring Sendmail
8.2. Mail Operation
8.3. Useful Commands
8.4. Sendmail Security
8.5. Mail Bombing
8.6. Spam
8.7. Conclusion
Chapter 9: Gateway to Internet
9.1. Gateway Configuration
9.2. Proxy Server Operation
9.3. Squid
9.4. Squid Access Rights
9.5. Working with Squid
9.6. Browser Caching
Chapter 10: File Transfer
10.1. FTP Operation
10.2. Configuring the wu-ftp Server
10.3. Main Settings of the wu-ftp Server
10.4. Creating Virtual Servers
10.5. Additional Settings
10.6. Guest Accounts
10.7. FTP Server Security
10.8. Supplementary Information
10.9. Summary
Chapter 11: Network Addressing
11.1. Introduction to DNS
11.2. Local Hosts File
11.3. External DNS Servers
11.4. Configuring DNS
11.5. Zone-Description Files
11.6. Reverse Zone
11.7. DNS Security
Chapter 12: System Monitoring
12.1. Automated Security Monitoring
12.2. Shutting SUID and SGID Doors
12.3. Testing the Configuration
12.4. Detecting Attacks
12.5. Logging
12.6. Handling Logs
12.7. Log Security
12.8. Network Security
Chapter 13: Backing Up and Restoring Data
13.1. Backup Fundamentals
13.2. Constant Availability
13.3. Saving Backup Copies
13.4. Backup Policy
13.5. Backup Capabilities in Linux
13.6. Securing Backup Media
Chapter 14: Advice from a Hacker
14.1. Security Fundamentals
14.2. Buffer Overflow
14.3. Rootkits
14.4. Back Doors
14.5. Monitoring Traffic
14.6. DoS and DDoS Attacks
14.7. Penetration through Trusted Systems
14.8. Dangerous Network File System
14.9. Detecting Break-ins
14.10. Cracking Passwords
14.11. Tuning Linux
14.12. Miscellaneous Recommendations
14.13. You ve Been Hacked
Part 1: Appendixes
Appendix 1: FTP Commands
Appendix 2: Useful Programs
Appendix 3: Internet Resources
Conclusion
List of Figures
List of Tables
List of Listings
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Summary
The Basics of Searching
Summary
Manipulating Group Membership
Summary
Java for RPG Programmers, 2nd Edition
The Java Onion
Data Types And Variables
Arrays And Vectors
Exceptions
More Java
Managing Enterprise Systems with the Windows Script Host
Shell Operations
Regular Expressions
Network Administration/WMI
Internet Applications
Security
The Complete Cisco VPN Configuration Guide
Keys
Administration Screens
VPN Client Software Updates
Summary
Summary
GO! with Microsoft Office 2003 Brief (2nd Edition)
Excel 2003
Skill Assessments
Objective 8. Use PowerPoint Help
Objective 2. Enter Data and Format a Table in Word
Objective 3. Copy and Paste as a Hyperlink into a PowerPoint Slide
InDesign Type: Professional Typography with Adobe InDesign CS2
Up Next
Keep It Consistent, Except. . .
Typographers Quotes
Redefining Styles
Calculating the Height of the Type Area
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies