Why Linux?
Compiling Programs in Linux
Scanning Networks
Mapping Networks
Password Cracking in Linux
SARA
TARA
Sniffing
A Pinger in disguise
Session Hijacking
Linux Rootkits
IP Chains and IP Tables
Linux Security Countermeasures