Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

C library calls supported by Unix

CA
[See Certificate Authority]

cache poisioning (ARP)

CAP_LINUX_IMMUTABLE capability

capabilities model (Linux), modifying

centralized logging, aggregating logs from remote sites

Certificate Authority (CA)

creating your own

public and private keys

distributing CA certificate to clients

Well-known Certificate Authorities

certificate-signing request

certificates, SSL

Apache SSL installation

creating and using with OpenVPN

creating for use with Sguil

for SnortCenter sensor

IMAP and POP, creating for

Nessus, generating for

self-signed, creating

CGI interface, running Perl scripts and PHP programs through

CGI scripts, enabling for user directories

chains (Netfilter)

check_ssh plug-in (Nagios)

checksums

MD5, maintained by RPM for installed files

modification of system MD5 program by attackers

system disk, generating for

chkrootkit

chmod command

chpax utility

chroot command

chroot( ) environment

availability of other programs within

BIND, running in

enhanced security using grsecurity

MySQL, running in

services running in

UID 0, risks of

CIDR notation

for network addresses

ranges of IP addresses for Snort rules

clocks (server), synchronizing

code examples, using

commands, logging use by users

compiler-based solutions to stack-smashing attacks

compression

LZO, use with OpenVPN

SSH, built-in

connect time, analyzing for users on system

content option, Snort rules
2nd

content type for file upload

cookies, preventing SQL injection in

copying system disks, bit-for-bit

cross-site scripting (XSS) attacks

cryptographic signature verification, automating

cryptography

encrypted tunnel, VTun

encrypting IMAP and POP with SSL

encrypting temp folder on Windows

encrypting traffic with SSH

keys for protection of Tripwire files

opportunistic encryption with FreeS/WAN

public keys, security concerns with

SFS (Self-certifying File System)

SSL encryption

TLS encryption, setting up for SMTP

curses-based GUI, configuring kernel to enable grsecurity


/ 158