Red Hat NETSCAPE MANAGEMENT SYSTEM 6.2 - COMMAND-LINE Guida di Installazione Pagina 65

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 82
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 64
Linux Security.com: http://www.linuxsecurity.com/docs/
Linux Newbie: http://www.linuxnewbie.org/nhf/intel/security/index.html
The comp.os.linux.security FAQ: http://www.linuxsecurity.com/docs/colsfaq.html
The Internet Firewall FAQ: http://www.interhack.net/pubs/fwfaq/
The Site Security Handbook RFC: http://www.ietf.org/rfc/rfc2196.txt
Miscellaneous sites of interest:
http://www.bastille−linux.org, for Mandrake and Red Hat only.
SAINT: http://www.wwdsi.com/saint/, system security analysis.
SSL: http://www.openssl.org/
SSH: http://www.openssh.org/
Scan yourself: http://www.hackerwhacker.com
PAM: http://www.kernel.org/pub/linux/libs/pam/index.html
Detecting Trojaned Linux Kernel Modules: http://members.prestige.net/tmiller12/papers/lkm.htm
Rootkit checker: http://www.chkrootkit.org
Port scanning tool nmap's home page: http://www.insecure.org
Nessus, more than just a port scanner: http://www.nessus.org
Tripwire, intrusion detection: http://www.tripwire.org
Snort, sniffer and more: http://www.snort.org
http://www.mynetwatchman.com and http://dshield.org are "Distributed Intrusion Detection
Systems". They collect log data from subscribing "agents", and collate the data to find and report
malicious activity. If you want to fight back, check these out.
8.6. Editing Text Files
By Bill Staehle
All the world is a file.
Security Quick−Start HOWTO for Red Hat Linux
8.6. Editing Text Files 62
Vedere la pagina 64
1 2 ... 60 61 62 63 64 65 66 67 68 69 70 ... 81 82

Commenti su questo manuale

Nessun commento