Linux Security Cookbook [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Security Cookbook [Electronic resources] - نسخه متنی

Daniel J. Barrett, Robert G. Byrnes, Richard Silverman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]

last command
2nd

lastb command

lastcomm utility

bugs in latest version

lastdb command

lastlog command

databases from several systems, merging

multiple systems, monitoring problems with

ldd command

libnet (toolkit for network packet manipulation)

libnids (for TCP stream reassembly)

libpcap (packet capture library)
2nd

binary files

Snort logging directory, creating in

logging Snort data to libpcap-format files

network trace files, ngrep

Snort, use by

libwrap, using with xinetd

Linux

/proc filesystem

differing locations for binaries and configuration files in distributions

encryption software included with

operating system vulnerabilities

Red Hat
[See Red Hat Linux]

supported distributions for security recipes

SuSE
[See SuSE Linux]

ListenAddress statements, adding to sshd_config

listfile module (PAM)

ACL file entries

local acces, permitting while blocking remote access

local facilities (system messages)

local filesystems, searching

local key (Tripwire)

creating with twinstall.sh script

fingerprints, creating in secure integrity checks

read-only integrity checking

local mail (acceptance by SMTP server)

local password authentication, using Kerberos with PAM

localhost

problems with Kerberos on SSH

SSH port forwarding, use in

unsecured mail sessions from

logfile group configuration file (logwatch)

logger program

writing system log entries via shell scripts and syslog API

logging

access to services

combining log files

firewalls, configuring for

nmap -o options, formats of

PAM modules, error messages

rotating log files

service access via xinetd

shutdowns, reboots, and runlevel changes in /var/log/wtmp

Snort
2nd

to binary files

partitioning into separate files

permissions for directory

stunnel messages

sudo command

remotely

system
[See system logger]

testing with nmap stealth operations

loghost

changing

remote logging of system messages

login shells, root

logins

adding another Kerberos principal to your ~/.k5login file

Kerberos, using with PAM

monitoring suspicious activity

printing information about for each user

recent logins to system accounts, checking

testing passwords for strength

CrackLib, using

John the Ripper, using

logouts, history of all on system

logrotate program
2nd
3rd

logwatch

filter, defining

integrating services into

listing all sudo invocation attempts

scanning log files for messages of interest

scanning Snort logs and sending out alerts

scanning system log files for problem reports

lsh (SSH implementation)

lsof command

+M option, (for processes using RPC services)

-c option (command name for processes)

-i option (for network connections)

-p option (selecting processes by ID)

-u option (username for processes)

/proc files, reading

IP addresses, conversion to hostnames

network connections for processes, listing

/ 247