Red Hat NETSCAPE MANAGEMENT SYSTEM 6.2 - COMMAND-LINE Guida di Installazione Pagina 6

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 82
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 5
This document is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without
even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
the GNU General Public License for more details.
You can get a copy of the GNU GPL at at http://www.gnu.org/copyleft/gpl.html.
1.4. Credits
Many thanks to those who helped with the production of this document.
Bill Staehle, who has done a little bit of everything: ideas, editing, encouragement, and suggestions,
many of which have been incorporated. Bill helped greatly with the content of this document.
Others who have contributed in one way or another: Dave Wreski, Ian Jones, Jacco de Leeuw, and
Indulis Bernsteins.
Various posters on comp.os.linux.security, a great place to learn about Linux and security.
The Netfilter Development team for their work on iptables and connection tracking, state of the art
tools with which to protect our systems.
1.5. Disclaimer
The author accepts no liability for the contents of this document. Use the concepts, examples and other
content at your own risk. As this is a new document, there may be errors and inaccuracies. Hopefully these
are few and far between. Corrections and suggestions are welcomed.
This document is intended to give the new user a starting point for securing their system while it is connected
to the Internet. Please understand that there is no intention whatsoever of claiming that the contents of this
document will necessarily result in an ultimately secure and worry−free computing environment. Security is a
complex topic. This document just addresses some of the most basic issues that inexperienced users should
be aware of.
The reader is encouraged to read other security related documentation and articles. And to stay abreast of
security issues as they evolve. Security is not an objective, but an ongoing process.
1.6. New Versions and Changelog
The current official version can always be found at
http://www.tldp.org/HOWTO/Security−Quickstart−Redhat−HOWTO/. Pre−release versions can be found at
http://feenix.burgiss.net/ldp/quickstart−rh/.
Other formats, including PDF, PS, single page HTML, may be found at the Linux Documentation HOWTO
index page: http://tldp.org/docs.html#howto.
Changelog:
Version 1.2: Clarifications on example firewall scripts, and small additions to 'Have I been Hacked'. Note on
Zonealarm type applications. More on the use of "chattr" by script kiddies, and how to check for this. Other
Security Quick−Start HOWTO for Red Hat Linux
1.4. Credits 3
Vedere la pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 81 82

Commenti su questo manuale

Nessun commento