Linux Security Cookbook [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Security Cookbook [Electronic resources] - نسخه متنی

Daniel J. Barrett, Robert G. Byrnes, Richard Silverman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید










Chapter 9. Testing and Monitoring


To keep your system secure, be
proactive: test for security holes and monitor for unusual activity.
If you don't keep watch for break-ins, you may wake
up one day to find your systems totally hacked and owned, which is no
party.

In this chapter we cover useful tools and techniques for testing and
monitoring your system, in the following areas:




Logins and passwords



Testing password strength, locating accounts with no password, and
tracking suspicious login activity




Filesystems



Searching them for weak security, and looking for rootkits


Networking



Looking for open ports, observing local network use, packet-sniffing,
tracing network processes, and detecting intrusions



Logging



Reading your system logs, writing log entries from various languages,
configuring syslogd, and rotating log files



We must emphasize that our discussion of
network
monitoring and intrusion detection is fairly basic.
Our recipes will get you started, but these important topics are
complex, with no easy, turnkey solutions. You may wish to investigate
additional resources for these purposes, such as:


/ 247