<span class="chapter-titlelabel">Chapter 14: </span> Computer Security Issues - Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] - نسخه متنی

Christopher Negus

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Chapter 14: Computer Security Issues


In This Chapter



With the growth of the Internet, computer and network security has become more important than ever. Assaults on your Red Hat Linux system can come in many forms, such as denial-of-service attacks, break-in attempts, or hijacking your machine as a spam relay, to name a few.

In many cases, good practices for setting and protecting passwords, monitoring log files and creating good firewalls will keep out many would-be intruders. Sometimes, more proactive approaches are needed to respond to break-ins. This chapter will familiarize you, as a Red Hat Linux administrator, with the dangers that exist and the tools necessary to protect your system.

/ 274