Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation, Volume 1Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone who knows which systems are vulnerable and how crackers get into them--this unique guide to Linux security identifies existing and potential security holes and faults, and then describes how to go about fixing them. |
Contents
Introduction | 1 |
Linux Security Basics | 7 |
Introducing Linux | 9 |
Copyright | |
48 other sections not shown
Common terms and phrases
access control allow Apache-SSL Application authentication backup Caldera OpenLinux CHAPTER client command Command-Line Options Computer Config configuration file connection Crack create database default delete deslogin disk drwxr-xr-x encryption environment etc/passwd etc/shadow eth proto example execute exploit fdisk file system firewall hapless hapless hardware header Here's host hostname htpasswd installation Internet intrusion detection IP address ipfwadm issue Linux distributions Location login machine mikal Netscape Nicole NOTE operating system operator operator operator option to specify output packet partition passphrase password PASSWORD ATTACKS Perl Protocol Qmail remote rlogin root root SATAN scan scanners script Secure Shell sendmail sequence number server session shadow suite shell significant security history SMTP sniffer sniffit spoofing spoofing attacks sshd SSLeay SUID syslog TABLE target TCP Wrappers telnet Tera Term Tripwire UNIX user's username users vulnerable workstations