Flylib.com
Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Hacker Linux Uncovered
Back Cover
About
Preface
Acknowledgments
Chapter 1: Introduction
1.1. Hacker Attacks
1.2. What is Linux?
1.3. Is Open-Source Code Secure?
1.4. The Kernel
1.5. Distributions
Chapter 2: Linux Installation and Initial Configuration
2.1. Preparing to Install
2.2. Starting the Installation
2.3. Disk Partitioning
2.4. Boot Loader
2.5. Network Configuration
2.6. Root Password
2.7. Installing Packages
2.8. First Boot
2.9. Moving Around the System
2.10. Help
2.11. Configuration Basics
Chapter 3: Welcome to Linux
3.1. Linux File Systems
3.2. System Boot
3.3. User Registration
3.4. Linux Processes
3.5. Task Scheduling
3.6. Network Configuration
3.7. Connecting to the Internet
3.8. Updating the Kernel
Chapter 4: Access Control
4.1. Access Rights
4.2. Group Management
4.3. Managing Users
4.4. Typical Rights-Assignment Mistakes
4.5. Privileged Programs
4.6. Additional Protection Features
4.7. Protecting Services
4.8. Obtaining Root Privileges
4.9. Expanding Access Permission
4.10. Firewalls
4.11. The ipchains Program
4.12. The iptables Program
4.13. Notes on Firewall Operation
4.14. Prohibiting and Permitting Hosts
4.15. Advice on Configuring a Firewall
4.16. Obtaining Higher Privileges
Chapter 5: Administration
5.1. Useful Commands
5.2. Encryption
5.3. SSH Protocol
5.4. The inetdxinetd Daemon
Chapter 6: Samba Style
6.1. Configuring Samba
6.2. Describing Objects
6.3. Managing Users
6.4. Using Samba
Chapter 7: Web Server
7.1. Main Settings
7.2. Modules
7.3. Access Rights
7.4. Creating Virtual Web Servers
7.5. Security Notes
7.6. The Convenience Factor
7.7. Securing Scripts
7.8. Web Page Indexing
7.9. Securing the Connection
Chapter 8: Electronic Mail
8.1. Configuring Sendmail
8.2. Mail Operation
8.3. Useful Commands
8.4. Sendmail Security
8.5. Mail Bombing
8.6. Spam
8.7. Conclusion
Chapter 9: Gateway to Internet
9.1. Gateway Configuration
9.2. Proxy Server Operation
9.3. Squid
9.4. Squid Access Rights
9.5. Working with Squid
9.6. Browser Caching
Chapter 10: File Transfer
10.1. FTP Operation
10.2. Configuring the wu-ftp Server
10.3. Main Settings of the wu-ftp Server
10.4. Creating Virtual Servers
10.5. Additional Settings
10.6. Guest Accounts
10.7. FTP Server Security
10.8. Supplementary Information
10.9. Summary
Chapter 11: Network Addressing
11.1. Introduction to DNS
11.2. Local Hosts File
11.3. External DNS Servers
11.4. Configuring DNS
11.5. Zone-Description Files
11.6. Reverse Zone
11.7. DNS Security
Chapter 12: System Monitoring
12.1. Automated Security Monitoring
12.2. Shutting SUID and SGID Doors
12.3. Testing the Configuration
12.4. Detecting Attacks
12.5. Logging
12.6. Handling Logs
12.7. Log Security
12.8. Network Security
Chapter 13: Backing Up and Restoring Data
13.1. Backup Fundamentals
13.2. Constant Availability
13.3. Saving Backup Copies
13.4. Backup Policy
13.5. Backup Capabilities in Linux
13.6. Securing Backup Media
Chapter 14: Advice from a Hacker
14.1. Security Fundamentals
14.2. Buffer Overflow
14.3. Rootkits
14.4. Back Doors
14.5. Monitoring Traffic
14.6. DoS and DDoS Attacks
14.7. Penetration through Trusted Systems
14.8. Dangerous Network File System
14.9. Detecting Break-ins
14.10. Cracking Passwords
14.11. Tuning Linux
14.12. Miscellaneous Recommendations
14.13. You ve Been Hacked
Part 1: Appendixes
Appendix 1: FTP Commands
Appendix 2: Useful Programs
Appendix 3: Internet Resources
Conclusion
List of Figures
List of Tables
List of Listings
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Conditional Logic
Processing Collections of Data
Using Procedures to Organize Scripts
Combining Different Scripting Languages
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Rotoscoping Techniques with Photoshop
Matte and Keying Plug-ins
Static Matte Painting in Photoshop
Atmosphere, Film, and Noise Effects
Appendix Adobe Photoshop and After Effects Resources
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 2
Generating Elevations
Using Layouts to Set Up a Print
Printing an AutoCAD Drawing
Appendix A Look at Drawing in 3D
Understanding Digital Signal Processing (2nd Edition)
PHASE RESPONSE OF FIR FILTERS
COMBINING DECIMATION AND INTERPOLATION
FREQUENCY TRANSLATION WITHOUT MULTIPLICATION
Section G.3. MULTISECTION COMPLEX FSF PHASE
Section G.4. MULTISECTION COMPLEX FSF FREQUENCY RESPONSE
User Interfaces in C#: Windows Forms and Custom Controls
Forms
Custom Controls
Design-Time Support for Custom Controls
MDI Interfaces and Workspaces
GDI+ Controls
Digital Character Animation 3 (No. 3)
Chapter Five. Creating Strong Poses
Posing the Body Naturally
Animating with Poses
Conclusion
Chapter Nine. Acting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies