Linux Security Cookbook [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Security Cookbook [Electronic resources] - نسخه متنی

Daniel J. Barrett, Robert G. Byrnes, Richard Silverman

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]

m4 macro processor

MAC addresses

controlling access by

spoofed

mail
[See email IMAP POP]

Mail application (Mozilla)

mail clients

connecting to mail server over SSL

support for secure POP and IMAP using SSL

mail facility (system messages)

mail servers

receiving Internet email without visible server

support for SSL

testing SSL connection locally

Mailcrypt

mc-deactivate-passwd to force passphrase erasure

official web site

using with GnuPG

mailpgp (script for encrypting/sending email)

mailsnarf command

-v option, capturing only unencrypted messages

malicious program, /tmp/ls

man-in-the-middle (MITM) attacks

dsniff, proof of concept with

self-signed certificates, risk of

services deployed with dummy keys

manual integrity checks

mask format, CIDR

Massachusetts Institute of Technology (MIT) Kerberos

matching anything (ALL keyword)
2nd

max_load keyword (xinetd)
2nd

mc-encrypt function

MD5 checksum

verifying for RPM-installed files

merging system log files

MH (mail handler)

mirroring a set of files securely between machines

MIT Kerberos

MITM
[See man-in-the-middle attacks]

modules

PAM

CrackLib

listfile
2nd

pam_stack

Perl

Sys::Lastlog and Sys::Utmp

Sys::Syslog

XML::Simple

monitoring systems for suspicious activity

account use

checking on multiple systems

device special files

directing system messages to log files

displaying executed commands

executed command, monitoring

filesystems

searching effectively

finding accounts with no password

finding superuser accounts

finding writable files

insecure network protocols, detecting

local network activities

log files, combining

logging

login passwords

logins and passwords

logwatch filter for services not supported

lsof command, investigating processes with

network-intrusion detection with Snort
2nd

decoding alert messages

logging output

partitioning logs into files

ruleset, upgrading and tuning

networking

observing network traffic

with Ethereal GUI

open network ports, testing for

packet sniffing with Snort

recovering from a hack

rootkits

rotating log files

scanning log files for problem reports

search path, testing

searching for strings in network traffic

security incident report, filing

sending messages to system logger

setuid and setgid programs, insecure

syslog configuration, testing

syslog messages, logging remotely

tracing processes

writing system log entries

shell scripts

with C

with Perl scripts

monitoring tools for networks

NIH page

web page information on

morepgp (script for decrypting/reading email)

mount command

-o nodev (prohibiting device special files)

grpid option

noexec option

nosuid option

setuid and setgid programs, protecting against misuse

mounts file (/proc)

Mozilla

certificate storage

encrypted mail with Mail & Newsgroups

Muffet, Alec (Crack utility)

multi-homed hosts

firewall for

SSH client, problems with canonical hostname

multi-homed server machines, socket mail server is listening on

multicast packets

multithreaded services (in inetd.conf)

mutt mailer

home web page

securing POP/IMAP with SSL

/ 247