Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

ICMP types and codes

id command

identd daemon

running under grsecurity

systrace policy for

ifconfig command

changing MAC address of Ethernet card used for sniffing

finding MAC address of an interface

grsecurity ACLs and

IKE negotiations

FreeBSD, controlling with racoon

Linux, controlling with pluto

IMAP, encrypting with SSL

incident recovery and response

finding compromised packages with RPM

finding the owner of a network

image mounted filesystems

root kits, scanning for

verifying file integrity and finding compromised files

inetd

inetd.conf entry for SWAT

systrace policy, generating for

initial sequence numbers (ISNs)

INPUT chain

Internet domain name, finding owner of

Internet Explorer, listing files opened by

intrusion detection

detecting anomalous behavior

distributed stealth sensor network

network intrusion detection systems (NIDS)

recording honeypot activity

sensor network, managing

Sguil, analyzing Snort events

simulating network of vulnerable hosts

Snort NIDS

alerts, tracking with ACID

rules, automatically updating

setting up

writing your own rules

Snort_inline, preventing and containing intrusions

web application intrusions

mod_security, Apache

inventorying your network

IP addresses

delegated by block owners to other parties

direction, specifying for Snort rules

nonroutable RFC 1918 address, handling with PacketFilter

PacketFilter table for nonroutable RFC 1918 addresses

pairing with MAC addresses, monitoring

querying number registry for address blocks

scanning ranges of with nmap

Snort variables for

SnortSam, specifying for

source and destination, in Snort rules

spoofing of, preventing with egress filtering

translation to hardware Ethernet addresses

for honeyd responses

IP IDs, randomizing for protection

IP Personality project

IP queue support, Linux kernel

IP Security Policy Management snap-in (Windows)

ip_queue.h file, editing for Snort_inline

IPsec connections

configuring under FreeBSD

configuring under Linux

configuring under OpenBSD

iptables command

-P (policy) switch

allowing a particular MAC address

bandwidth used by particular machine, tracking

configuring kernel to send pakets to IP queues

IP Personality patch

SnortSam, using with

isakmpd (IPsec key-management daemon)


/ 158