Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

Nagios

configuration files

contactgroups.cfg file

contacts.cfg file

examples of

host.cfg

hostgroup.cfg

nagios.cfg

services.cfg

plug-ins, downloading and installing

name server, attacker scans for vulnerable versions of BIND

named policy (systrace)

NAT (network address translation)

provided by Internet gateway

randomizing IP IDs to prevent counting of machines on network

Nessus security scanner

brute-force logins to services

clients for

generating certificate for

hosts, scanning

port scans, options for

reports on scans

vulnerability types, selecting

Net::PcapUtils Perl module

Net::RawIP Perl module

Net::SSLeay module

NetBIOS name, specifying for remote system

Netfilter

chains

iptables command

libipq library

MAC filtering with

rule order

saving all rules

stateful packet-inspection engine

web site for downloads

NetPacket Perl module

netstat program
2nd

network intrusion detection systems (NIDS)
[See intrusion detection]

network monitoring

auditing network traffic

collecting statistics with firewall rules

contact groups for hosts

contacts for notification messages

graphing trends

hosts, configuring for

ntop, running for real-time statistics

remote monitoring with rpcapd

services

network owner, finding

network security checker for Windows
[See HFNetChk tool]

network segment, scanning under Windows

network time protocol (NTP)

NFS, security problems with

NIDS (network intrusion detection systems)
[See intrusion detection]

Nmap

detecting operating system with

fooling by emulating another operating system

inventorying your network

running on IP addresses handled by honeyd

nobody account (Apache)

nodev, noexec, and nosuid flags (mount)

NOPASSWD: flag (sudo)

ntop tool

NTP (network time protocol)

Ntsyslog

configuration program, using

number registries for IP address blocks


/ 158