Flylib.com
Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Hacker Linux Uncovered
Back Cover
About
Preface
Acknowledgments
Chapter 1: Introduction
1.1. Hacker Attacks
1.2. What is Linux?
1.3. Is Open-Source Code Secure?
1.4. The Kernel
1.5. Distributions
Chapter 2: Linux Installation and Initial Configuration
2.1. Preparing to Install
2.2. Starting the Installation
2.3. Disk Partitioning
2.4. Boot Loader
2.5. Network Configuration
2.6. Root Password
2.7. Installing Packages
2.8. First Boot
2.9. Moving Around the System
2.10. Help
2.11. Configuration Basics
Chapter 3: Welcome to Linux
3.1. Linux File Systems
3.2. System Boot
3.3. User Registration
3.4. Linux Processes
3.5. Task Scheduling
3.6. Network Configuration
3.7. Connecting to the Internet
3.8. Updating the Kernel
Chapter 4: Access Control
4.1. Access Rights
4.2. Group Management
4.3. Managing Users
4.4. Typical Rights-Assignment Mistakes
4.5. Privileged Programs
4.6. Additional Protection Features
4.7. Protecting Services
4.8. Obtaining Root Privileges
4.9. Expanding Access Permission
4.10. Firewalls
4.11. The ipchains Program
4.12. The iptables Program
4.13. Notes on Firewall Operation
4.14. Prohibiting and Permitting Hosts
4.15. Advice on Configuring a Firewall
4.16. Obtaining Higher Privileges
Chapter 5: Administration
5.1. Useful Commands
5.2. Encryption
5.3. SSH Protocol
5.4. The inetdxinetd Daemon
Chapter 6: Samba Style
6.1. Configuring Samba
6.2. Describing Objects
6.3. Managing Users
6.4. Using Samba
Chapter 7: Web Server
7.1. Main Settings
7.2. Modules
7.3. Access Rights
7.4. Creating Virtual Web Servers
7.5. Security Notes
7.6. The Convenience Factor
7.7. Securing Scripts
7.8. Web Page Indexing
7.9. Securing the Connection
Chapter 8: Electronic Mail
8.1. Configuring Sendmail
8.2. Mail Operation
8.3. Useful Commands
8.4. Sendmail Security
8.5. Mail Bombing
8.6. Spam
8.7. Conclusion
Chapter 9: Gateway to Internet
9.1. Gateway Configuration
9.2. Proxy Server Operation
9.3. Squid
9.4. Squid Access Rights
9.5. Working with Squid
9.6. Browser Caching
Chapter 10: File Transfer
10.1. FTP Operation
10.2. Configuring the wu-ftp Server
10.3. Main Settings of the wu-ftp Server
10.4. Creating Virtual Servers
10.5. Additional Settings
10.6. Guest Accounts
10.7. FTP Server Security
10.8. Supplementary Information
10.9. Summary
Chapter 11: Network Addressing
11.1. Introduction to DNS
11.2. Local Hosts File
11.3. External DNS Servers
11.4. Configuring DNS
11.5. Zone-Description Files
11.6. Reverse Zone
11.7. DNS Security
Chapter 12: System Monitoring
12.1. Automated Security Monitoring
12.2. Shutting SUID and SGID Doors
12.3. Testing the Configuration
12.4. Detecting Attacks
12.5. Logging
12.6. Handling Logs
12.7. Log Security
12.8. Network Security
Chapter 13: Backing Up and Restoring Data
13.1. Backup Fundamentals
13.2. Constant Availability
13.3. Saving Backup Copies
13.4. Backup Policy
13.5. Backup Capabilities in Linux
13.6. Securing Backup Media
Chapter 14: Advice from a Hacker
14.1. Security Fundamentals
14.2. Buffer Overflow
14.3. Rootkits
14.4. Back Doors
14.5. Monitoring Traffic
14.6. DoS and DDoS Attacks
14.7. Penetration through Trusted Systems
14.8. Dangerous Network File System
14.9. Detecting Break-ins
14.10. Cracking Passwords
14.11. Tuning Linux
14.12. Miscellaneous Recommendations
14.13. You ve Been Hacked
Part 1: Appendixes
Appendix 1: FTP Commands
Appendix 2: Useful Programs
Appendix 3: Internet Resources
Conclusion
List of Figures
List of Tables
List of Listings
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Apply Your Knowledge
Apply Your Knowledge
Apply Your Knowledge
Key Terms
Limited Warranty and Disclaimer
Snort Cookbook
Sniffing Gigabit Ethernet
Logging to the Windows Event Viewer
Generating Statistical Output from Snort Databases
Working with Honeypots and Honeynets
Snort and Investigations
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Junos Cookbook (Cookbooks (OReilly))
Viewing Traffic Statistics on an Interface
Configuring an IPv4 Address on an Interface
Load-Balancing Traffic Flows
Adding Martian Addresses
Adding a BGP Community to Routes
802.11 Wireless Networks: The Definitive Guide, Second Edition
Problems with WEP
General Functions of an Access Point
Authentication and Access Control
Using Antennas to Tailor Coverage
Other Tools
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
The Three Basic Patterns of Office Solutions
Working with the Range Object
Ways to Customize Outlook
Events in the Outlook Object Model
Code Access Security in .NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies