Acknowledgments

   


I profusely thank Stan Kelly-Bootle who gave me my first few programming jobs outside of the university and who has helped me in many ways and has been a friend through many years since.

I thank Mark Compton, who, as editor of UNIX Review magazine allowed me the privilege of writing for that publication and who continued my personal education in how to write, which was started by Jim Joyce. I thank Doug Merritt, friend and colleague, with whom I explored UNIX and its security and who always challenged me to do better; he always has an ear to bend. Thanks to Dan Brodsky for giving me a wonderful 2 GB disk for my laptop to replace the 300 MB disk and help this book along. Thanks to webvan.com for delicious food delivered to my door, allowing more time to work on the book.

John Peeler, Alan Palmore, and Dave Barker of Nedlloyd Lines trusted me to manage their large production UNIX systems and a small Linux system that ran their multinational shipping operations in North and South America and which were networked to their other systems in Europe, Asia, Africa, and Australia. They allowed me to hone my system administrations skills.

I thank the many helpful folks at the Atlanta Linux Enthusiasts group for furthering my Linux knowledge.

I thank Pacific Pawnbrokers (www.pawnbroker.com) for providing me with a wonderful Rolls-Royce that was everything they promised, and ebay.com for the connection, and both for a wonderful lead-in to Chapter 13, "Preparing Your Hardware," which discusses hot backup systems.

I thank all of the folks at ApplianceWare, a shop dedicated to Linux appliances especially Larry Gee and Lon Feldman who helped me polish my Linux skills. Thanks to Ken Bazzle, Stacy Kenworthy, Britt Kinsler, and Steve Soto.

Larry Gee also provided a valuable in-depth review of the first drafts of the book, offering suggestions that substantially improved it, wrote "Doing the Samba" on page 208, contributed heavily to "The Seven Most Deadly Sins" on page 27, "Stopping End Runs Around Firewalls" on page 74, "Do Not Get the Finger" on page 94, and "Turn Off rwhod" on page 95.

My deep gratitude goes to Linus Torvalds, Eric Raymond, Richard Stallman and The Free Software Foundation, and the thousands of Linux volunteers who give freely of their time and outstanding skills to make Linux a great operating system and to Ken Thompson, Dennis Ritchie, Steve Bourne, Bill Joy, Bob Kridle, and the others who paved the way with UNIX and who helped this author personally. This book was written with vi and formatted with groff and my modified mm macros, on Slackware Linux.

Thanks to Kurt Seifried (for his excellent online Linux Administrators Security Guide and many articles on Linux security at www.seifried.org), X-Force, Bugtraq, CERT, CIAC, and others who freely disseminate information on protecting systems from crackers. They have been invaluable in preparing information for this book as well as for security everywhere.

Mike O'Shaughnessy deserves special thanks for dragging me disbelieving into the Linux community in 1994 and helping me at every turn before and after. Mike provided much research for this book. I asked Mike to co-author this book but his personal obligations prevented him from accepting.

My deep gratitude and great thanks go to my reviewers, who prodded me to improve the book and helped to make it much better. They are Larry Gee, consultant, and Mike O'Shaughnessy of Quarry Technologies, who reviewed it from the perspective of experienced Linux system administrators; Kurt Seifried, consultant at www.seifried.org, and Mike Warfield of Internet Security Systems, who are two of the top Linux and UNIX security experts in the world; Stephen Friedl, consultant at www.unixwiz.com, who reviewed it from a security perspective; and Dr. Indira Moyer, consultant, who reviewed it as a Linux novice.

I give many thanks to Miles Williams, my Acquisitions Editor, who put his faith in a first time book author who had been spurned by another publisher and whose skillful help enabled ideas to be formed into a book. Many thanks go to Vanessa Moore and Grechen Throop, my Production Editors, for their superior skill and professionalism on a difficult project and for their patience with too many last-minute additions and corrections. It has been a pleasure to work with John Neidhart, my acquisutions editor, and with Don Maclaren, who supervised editing and production for the second edition with infinite patience.

I thank my second edition technical reviewers, Larry Gee, John Wells IV, Dow Hurst, Bill Tihen, and Mike O'Shaughnessy. Larry also revised and greatly expanded the Samba section and helped to make alterations to the book suggested by the reviewers. The substantial reduction of typographical, grammatical, and other errors in the second edition is due to Cindy Browning's tireless effort in checking every word of new and existing material.

My unending love and gratitude go to Cindy Browning who suffered many hours without me (and many with me tapping away on the keyboard of my Linux-only laptop into the wee hours) and my bouts of writer's anguish while writing this book.

Bob Toxen
The Ides of September, 2002


   
Top


Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Real World Linux Security Prentice Hall Ptr Open Source Technology Series
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 260

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net