linux security
... Security On Linux System Power by: N.X.Bi O==(=========> ^($)^ Supporter Of VTF) (E-mail: binhnx2000@yahoo.com | Home: http://www.vieteam.com/) Mở đầu: Tôi Fan Linux, người yêu thích Security ... Linux, người yêu thích Security Tôi thích Linux, đặc biệt khả tuyệt vời Tôi viết tài liệu với mục đích muốn chia sẻ với người chút hiểu biết ỏi Security Linux Không có mục đích khác Những chia ... http://www.tripwiresecurity.com/ • OpenWall Security Project http://www.openwall.com/ • Network Time Protocol information http://www.ntp.org/ • Kapersky AntiVirus Pro http://www.avp.ch 12) Lời kết Security...
Ngày tải lên: 28/02/2014, 21:05
maximum linux security, 2nd ed.
... Appendixes 685 A Linux Security Command Reference 687 B Linux Security Index—Past Linux Security Issues 723 C Other Useful Linux Security Utilities/Applications 741 D Linux/ Unix Security Tools ... PART Linux Security Basics I IN THIS PART Introducing Linux Security Physical Security Installation Issues 29 59 Basic Linux System Administration 95 Introducing Linux Security CHAPTER 10 Linux Security ... PART I Linux Security Basics Introducing Linux Security What Is Linux? 10 Linux Is Free 10 Linux Closely Resembles Unix 13 Where Did Linux Come From? 15 Why Linux...
Ngày tải lên: 25/03/2014, 11:50
... Service Security 15 16 17 18 19 Web Server Security 351 DNS Server Security 399 E-Mail Server Security 415 FTP Server Security ... commands: I If /usr/src /linux is a symbolic link, run the rm -f linux command This removes the symbolic link I If /usr/src /linux is a directory, run the command mv linux linux.oldversion (oldversion ... command ln -s /usr/src /linux- 2.4.1 linux This creates a new symbolic link, linux, that points to the /usr/src /linux- 2.4.1 directory Change your directory path to /usr/src /linux At this point you...
Ngày tải lên: 07/04/2014, 15:42
... Network Security 17 2.3 Threats To Server Security 19 2.4 Threats To Workstation and Home PC Security 21 II Configuring Red Hat Linux for Security 23 Security ... Introduction Welcome to the Official Red Hat Linux Security Guide! The Official Red Hat Linux Security Guide is designed to assist users of Red Hat Linux in learning the process and practice of ... of Red Hat Linux in greater detail than the Official Red Hat Linux Security Guide: • Official Red Hat Linux Installation Guide for information regarding installation • Official Red Hat Linux Getting...
Ngày tải lên: 18/04/2014, 10:22
Red Hat Linux Security and Optimization ppt
... Service Security 15 16 17 18 19 Web Server Security 351 DNS Server Security 399 E-Mail Server Security 415 FTP Server Security ... commands: I If /usr/src /linux is a symbolic link, run the rm -f linux command This removes the symbolic link I If /usr/src /linux is a directory, run the command mv linux linux.oldversion (oldversion ... command ln -s /usr/src /linux- 2.4.1 linux This creates a new symbolic link, linux, that points to the /usr/src /linux- 2.4.1 directory Change your directory path to /usr/src /linux At this point you...
Ngày tải lên: 07/08/2014, 07:21
Additional Resources
... function, 35, 40, 149 linear equations See equations linsolve, 25, 63, 123, 156 linspace, 19, 150 Linux, vi load, 8, 9, 69, 90, 143, 175 loadurl, 69 local variables, 40 log, 23, 153, 195 log10,...
Ngày tải lên: 29/09/2013, 21:20
Linux Systems Administrators - Security
... volume, and very informative LinuxSecurity.com References The LinuxSecurity.com web site has numerous Linux and open source security references written by the LinuxSecurity staff and people collectively ... many other security tools His home site has some interesting security survey information, as well as security tools: http://www.trouble.org The Linux security WWW is a good site for Linux security ... Questions with answers for the comp.os .linux. security newsgroup Linux Security Documentation A great starting point for information pertaining to Linux and Open Source security FTP Sites CERT is the...
Ngày tải lên: 19/10/2013, 02:20
Installing and Using Endpoint Security Agent for Linux Server Version NGX 7.0 GA
... workflow page Endpoint Security Agent for Linux provides enterprise endpoint security for Linux users Use this guide to install and administer Endpoint Security Agent for Linux This document is ... Endpoint Security Agent for Linux To deploy Endpoint Security Agent for Linux: Create a user catalog and group for the protected Linux computers See “Creating a user catalog and group for Linux ... Endpoint Security Agent for Linux Setting specific security policies: You may wish your Linux users to have different security rules than your Windows users Reducing policy size: Since the Linux...
Ngày tải lên: 23/10/2013, 12:15
Red hat enterprise linux 6 security guide en US
... protected by SELinux, refer to the SELinux Managing Confined Services Guide Other available resources for SELinux are listed in Chapter 8, References 1.1.3 Security Controls Computer security is ... discussion of SELinux is beyond the scope of this document; however, for more information on SELinux and its use in Red Hat Enterprise Linux, refer to the Red Hat Enterprise Linux SELinux User Guide ... .Security. Overview 1.1 Introduction to Security 1.1.1 What is Computer Security? 1.1.1.1 How did Computer Security come about? 1.1.1.2 Security...
Ngày tải lên: 25/11/2013, 11:06
Tài liệu Module 5: Creating a Security Design for Physical Resources pdf
... physical resources Design security for physical resources 2 Module 5: Creating a Security Design for Physical Resources Lesson: Determining Threats and Analyzing Risks to Physical Resources ... Describe physical resources to protect Explain why physical security is important List threats to physical security Module 5: Creating a Security Design for Physical Resources Physical Resources to ... physical security, see the white paper, Basic Physical Security, at: http://www.microsoft.com/technet/columns /security/ 5min/5min-203.asp 4 Module 5: Creating a Security Design for Physical Resources...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Advanced Linux Programming: D Online Resources pptx
... GNU /Linux. This site is one of the best places to stay abreast of the newest releases of GNU /Linux software, from core system components to more obscure, specialized applications http://www.linuxsecurity.com ... http://www.kernel.org is the primary site for distribution of the Linux kernel source code For the trickiest and most technically detailed questions about how Linux works, the source code is the best place to ... also the Documentation directory for explanation of the kernel internals http://www.linuxhq.com also distributes Linux kernel sources, patches, and related information http://gcc.gnu.org is the...
Ngày tải lên: 21/01/2014, 07:20
Tài liệu Advanced Linux Programming: 10-Security ppt
... More Security Holes 211 The basics covered here are enough for most simple programs Full documentation about how PAM works is available in /usr/doc/pam on most GNU /Linux systems 10.6 More Security ... multiple special users was called MULTICS GNU /Linux, of course, is mostly compatible with UNIX 12 0430 CH10 5/22/01 10:42 AM Page 200 200 Chapter 10 Security To get the user ID and group ID for ... 10 Security There is one important exception: Processes running as root (those with user ID 0) are always allowed to access any file, regardless of the permissions associated with it 10.3.1 Security...
Ngày tải lên: 26/01/2014, 07:20
Tài liệu land resources information systems for food security in sadc countries ppt
Ngày tải lên: 23/02/2014, 04:20
Linux Administrators Security Guide ppt
... protected and you have a pretty secure system 20 The Linux kernel Linux (GNU /Linux according to Stallman if you’ referring to a complete Linux distribution) re is actually just the kernel of ... against using this feature across public networks Linuxconf ships with RedHat Linux and is available at: http://www.solucorp.qc.ca/linuxconf/ Linuxconf also doesn't seem to ship with any man pages/etc, ... errata and security lists RedHat Debian Slackware Caldera SuSE Internet connection checklist Appendix A: Books and magazines Appendix B: URL listing for programs Appendix C: Other Linux security...
Ngày tải lên: 05/03/2014, 18:20
Managing Password Security and Resources pot
... Managing Resources Using the Database Resource Manager • Resource plans specify the resource consumer groups belonging to the plan • Resource plans contain directives for how to allocate resources ... IDLE_TIME 60 CONNECT_TIME 480; 14-25 Copyright © Oracle Corporation, 2002 All rights reserved Managing Resources Using the Database Resource Manager • Provides the Oracle server with more control over ... able to the following: • Manage passwords using profiles • Administer profiles • Control use of resources using profiles • Obtain password and resource limit information 14-2 Copyright © Oracle...
Ngày tải lên: 06/03/2014, 17:20
Low-End Embedded Linux Platform for Network Security Application – Smurf Based Attack Detection docx
... called Embedded Security Scan Detector (ESSD) and its task is to ensure security through incorporation of Smurf Attack Detection Figure shows a possible deployment of the Embedded Security Scan ... Discussion Embedded Security Scan Detector (ESSD) has been implemented on Linux 2.4.23 Single Board Computer IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.11, ... segment by Linux Based desktop computer At the end, the system will send all the detected information into a file Thus, the new Embedded Security Scan Detector system is considered to be a security...
Ngày tải lên: 14/03/2014, 22:20
RH253 - Red Hat Enterprise Linux Network Services and Security Administration docx
... Options A tcp_wrappers Example xinetd and tcp_wrappers SELinux SELinux, continued SELinux: Targeted Policy SELinux: Management SELinux: semanage SELinux: File Types End of Unit Unit - Network Resource ... http://www.way2download.com /linux/ RH253/ (3 of 10) [2008/02/06 08:25:50 PM] RH253 - Red Hat Enterprise Linux Network Services and Security Administration Basic Chain Operations Additional Chain Operations ... rights reserved http://www.way2download.com /linux/ RH253/unit-1/page03.html [2008/02/06 08:26:47 PM] 1-3 Security in Principle Security in Principle ● Security Domains r r r r Physical Local Remote...
Ngày tải lên: 22/03/2014, 14:20
hack proofing linux - your guide to open source security
... Hack Proofing Linux Fast Track 605 Index 637 xxv 138 _linux_ ToC 6/20/01 9:27 AM Page xxvi 138 _linux_ pref 6/20/01 9:28 AM Page xxvii Preface Hack Proofing Linux: A Guide to Open Source Security is ... designer of security and A+ courses for NetG,Thompson/WAVE learning, and ComputerPREP Active in the Linux community, James sits on the Linux Professional Institute (www.lpi.org), SAIR (www.linuxcertification.org), ... http://packetstorm.securify.com s RPMFind www.rpmfind.net s LinuxLinks www.linuxlinks.com s Tucows www.tucows.com s Startplaza www.startplaza.nu s SecurityFocus www.securityfocus.com s AtStake www.atstake.com...
Ngày tải lên: 25/03/2014, 11:18
hacknotes - linux & unix security portable reference
... http://www.faqs.org/rfcs/rfc768.html Online Resources RC 15 ONLINE RESOURCES In addition to the various online resources mentioned throughout the book, this section contains pointers to additional resources that can ... Audit, Network, Security) http://www.sans.org/ CSI (Computer Security Institute) http://www.gocsi.com/ RSA http://www.rsasecurity.com/company/ events/index.html Online Resources Security conferences ... HackNotes Linux and Unix Security Portable Reference Chapter 12 The Sharp Zaurus PDA device runs an embedded version of the Linux operating system This chapter shows you the various security tools...
Ngày tải lên: 25/03/2014, 11:22