Red Hat NETSCAPE MANAGEMENT SYSTEM 6.2 - COMMAND-LINE Guida di Installazione Pagina 3

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 82
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 2
Table of Contents
7. General Tips..................................................................................................................................................40
8. Appendix........................................................................................................................................................43
8.1. Servers, Ports, and Packets.............................................................................................................43
8.2. Common Ports................................................................................................................................45
8.3. Netstat Tutorial...............................................................................................................................48
8.3.1. Overview.........................................................................................................................48
8.3.2. Port and Process Owners................................................................................................52
8.4. Attacks and Threats.........................................................................................................................56
8.4.1. Port Scans and Probes.....................................................................................................56
8.4.2. Rootkits...........................................................................................................................57
8.4.3. Worms and Zombies.......................................................................................................57
8.4.4. Script Kiddies.................................................................................................................58
8.4.5. Spoofed IPs.....................................................................................................................58
8.4.6. Targeted Attacks.............................................................................................................58
8.4.7. Denial of Service (DoS)..................................................................................................59
8.4.8. Brute Force.....................................................................................................................59
8.4.9. Viruses............................................................................................................................60
8.5. Links...............................................................................................................................................60
8.6. Editing Text Files............................................................................................................................62
8.7. nmap................................................................................................................................................65
8.8. Sysctl Options.................................................................................................................................68
8.9. Secure Alternatives.........................................................................................................................70
8.10. Ipchains and Iptables Redux.........................................................................................................70
8.10.1. ipchains II.....................................................................................................................70
8.10.2. iptables II......................................................................................................................74
8.10.3. Summary.......................................................................................................................78
8.10.4. iptables mini−me..........................................................................................................79
Security Quick−Start HOWTO for Red Hat Linux
ii
Vedere la pagina 2
1 2 3 4 5 6 7 8 ... 81 82

Commenti su questo manuale

Nessun commento