Linux Security Cookbook [Electronic resources] نسخه متنی
لطفا منتظر باشید ...
[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
m4 macro processor
MAC addressescontrolling access by
spoofed
mail
[See email IMAP POP]Mail application (Mozilla)
mail clientsconnecting to mail server over SSL
support for secure POP and IMAP using SSL
mail facility (system messages)
mail serversreceiving Internet email without visible server
support for SSL
testing SSL connection locally
Mailcryptmc-deactivate-passwd to force passphrase erasure
official web site
using with GnuPG
mailpgp (script for encrypting/sending email)
mailsnarf command
-v option, capturing only unencrypted messages
malicious program, /tmp/ls
man-in-the-middle (MITM) attacksdsniff, proof of concept with
self-signed certificates, risk of
services deployed with dummy keys
manual integrity checks
mask format, CIDR
Massachusetts Institute of Technology (MIT) Kerberos
matching anything (ALL keyword)
2nd
max_load keyword (xinetd)
2nd
mc-encrypt function
MD5 checksumverifying for RPM-installed files
merging system log files
MH (mail handler)
mirroring a set of files securely between machines
MIT Kerberos
MITM
[See man-in-the-middle attacks]modulesPAM
CrackLib
listfile
2nd
pam_stack
PerlSys::Lastlog and Sys::Utmp
Sys::Syslog
XML::Simple
monitoring systems for suspicious activity
account use
checking on multiple systems
device special files
directing system messages to log files
displaying executed commands
executed command, monitoring
filesystems
searching effectively
finding accounts with no password
finding superuser accounts
finding writable files
insecure network protocols, detecting
local network activities
log files, combining
logging
login passwords
logins and passwords
logwatch filter for services not supported
lsof command, investigating processes with
network-intrusion detection with Snort
2nd
decoding alert messages
logging output
partitioning logs into files
ruleset, upgrading and tuning
networking
observing network traffic
with Ethereal GUI
open network ports, testing for
packet sniffing with Snort
recovering from a hack
rootkits
rotating log files
scanning log files for problem reports
search path, testing
searching for strings in network traffic
security incident report, filing
sending messages to system logger
setuid and setgid programs, insecure
syslog configuration, testing
syslog messages, logging remotely
tracing processes
writing system log entriesshell scripts
with C
with Perl scripts
monitoring tools for networksNIH page
web page information on
morepgp (script for decrypting/reading email)
mount command
-o nodev (prohibiting device special files)
grpid option
noexec option
nosuid option
setuid and setgid programs, protecting against misuse
mounts file (/proc)
Mozillacertificate storage
encrypted mail with Mail & Newsgroups
Muffet, Alec (Crack utility)
multi-homed hostsfirewall for
SSH client, problems with canonical hostname
multi-homed server machines, socket mail server is listening on
multicast packets
multithreaded services (in inetd.conf)
mutt mailer
home web page
securing POP/IMAP with SSL