hack proofing linux a Guide to Open Source Security phần 1 docx
... Changes 8 Partially Developed Solutions 8 Should I Use an RPM or Tarballs? 10 Tarball 10 Red Hat Package Manager 11 Debian 11 Obtaining Open Source Software 12 SourceForge 12 Freshmeat 13 Packetstorm ... to Open Source Security ™ 1 YEAR UPGRADE BUYER PROTECTION PLAN Linux: A Guide to Open Source Security The Only Way to Stop a Hacker Is to Think...
Ngày tải lên: 08/08/2014, 21:23
... username and password. Instead, it is recommended that you use an Apache Web-based file archive to allow the public to download files. Bastille Versions Bastille 1. 1.0 and later incorporates several ... steps to install and configure Bastille: 1. Log in as root. 2. Copy the Bastille tarball to your root directory.You can access the tarball from the CD accompanying this book (Bastille...
Ngày tải lên: 08/08/2014, 21:23
... data? A: As you have learned, packet sniffing is a powerful tool. It allows malicious hackers to capture packets that contain passwords and usernames.The only way to protect yourself against hackers ... directories, and databases. ; An IDS can act as a supplement to a firewall, because it can help you monitor traffic on the internal network. Sometimes it may be useful to place an...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 7 docx
... –qa | grep apache 6. Host2:You should receive a response similar to the following if Apache is installed: apache-manual -1. 3 .12 -25 apache -1. 3 .12 -25 apache-devel -1. 3 .12 -25 www.syngress.com 13 8 _linux_ 08 ... Red Hat Package Manager (RPM) packages are already installed (you may need to update them later in this section). To check if an RPM is installed, enter rpm -qa | gre...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 9 docx
... Frequently Asked Questions Chapter 11 543 13 8 _linux_ 11 6/20/ 01 9: 51 AM Page 543 Maintaining Firewalls • Chapter 11 549 employee morale. Make sure that upper management understands the ramifications of any ... be preludes to an attack. Following is a more detailed discussion concerning each of these issues. Maintaining Firewalls • Chapter 11 545 13 8 _linux_ 11 6/20/ 01 9: 5...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 3 pot
... may wish to use Nmap in a network that uses a well-configured firewall or an IDS). If so, you may want to conduct scans that cannot be easily detected, or are actually able to traverse a firewall ... 9:36 AM Page 15 6 System Scanning and Probing • Chapter 3 14 1 application, such as Cheops or an IDS to generate a network map. See later in this chapter and Chapter 4 for more inf...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 4 pdf
... Snort to Log to a Database ■ Identifying Snort Add-Ons ; Summary ; Solutions Fast Track ; Frequently Asked Questions Chapter 4 19 1 13 8 _linux_ 04 6/20/ 01 9:38 AM Page 19 1 18 6 Chapter 3 • System Scanning ... generally extends your logging capability by placing additional information into a log file or into a database. Alerting An IDS often has the ability to send alert...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 6 pptx
... and /var/kerberos/krb5kdc/kdc.acl files to reflect your Kerberos realm and DNS domain names.You must then add an administrative user, as well as additional principals, to the database. Using kadmin.local Because ... a Kerberos administrator uses the kadmin pro- gram to add a principal to the database. Note that the ticket does not actually contain the password. It is only signed by...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 8 doc
... Implementing a Firewall with Ipchains and Iptables Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities Several attempts have been made to automate the process of creating a ... own dynamic database. If this database senses a number of ports that have been scanned in a row, the firewall can take action. Some actions the firewall can take may include automat...
Ngày tải lên: 08/08/2014, 21:23
hack proofing linux a Guide to Open Source Security phần 10 pps
... 462 Nessus, 16 5 16 6 client/server relationship, 16 7 16 9 continuous scans, 18 1 creating new users, 17 4 detached scans, 18 0, 18 1, 18 2 18 4 differential scans, 18 0 18 1, 18 2 18 4 disabling gtk support, 17 1 firewalls ... 11 makefiles, tarball, 10 , 11 Makinen,Tuomo, 14 7 malware, open source software as, 8–9 man-in-the middle attacks, 3 01 302, 303 management, comm...
Ngày tải lên: 08/08/2014, 21:23