hack proofing linux a Guide to Open Source Security phần 6 pptx

hack proofing linux a Guide to Open Source Security phần 6 pptx

hack proofing linux a Guide to Open Source Security phần 6 pptx

... and /var/kerberos/krb5kdc/kdc.acl files to reflect your Kerberos realm and DNS domain names.You must then add an administrative user, as well as additional principals, to the database. Using kadmin.local Because ... a Kerberos administrator uses the kadmin pro- gram to add a principal to the database. Note that the ticket does not actually contain the password. It is only signed by...
Ngày tải lên : 08/08/2014, 21:23
  • 70
  • 390
  • 0
hack proofing linux a Guide to Open Source Security phần 1 docx

hack proofing linux a Guide to Open Source Security phần 1 docx

... to Open Source Security ™ 1 YEAR UPGRADE BUYER PROTECTION PLAN Linux: A Guide to Open Source Security The Only Way to Stop a Hacker Is to Think Like One James Stanger Patrick T. Lane 138 _linux_ FM ... such as IBM, Compaq, and Intel. 138 _linux_ FM 6/ 20/01 9:29 AM Page viii 14 Chapter 1 • Introduction to Open Source Security Packetstorm Packetstorm is spec...
Ngày tải lên : 08/08/2014, 21:23
  • 66
  • 334
  • 0
hack proofing linux a Guide to Open Source Security phần 2 docx

hack proofing linux a Guide to Open Source Security phần 2 docx

... supplied a username and password. If a user attempts to run the command via sudo and that user is not in the sudoers file, an e-mail is automatically sent to the administrator, indicating that an unauthorized ... that all administrators down- load and install the security upgrades to avoid denial-of-service (DoS) and intrusion attacks that can result from these weaknesses. For exam...
Ngày tải lên : 08/08/2014, 21:23
  • 76
  • 312
  • 0
hack proofing linux a Guide to Open Source Security phần 3 pot

hack proofing linux a Guide to Open Source Security phần 3 pot

... adns (www.gnu.org/software/ adns), gnome, and libpcap (libpcap is on the accompanying CD). All but adns are installed by default in Red Hat 7.0 systems, and all of the RPM packages are available ... 9:35 AM Page 124 152 Chapter 3 • System Scanning and Probing ■ The ability to add an entire IP network or DNS domain to the map, and then have Cheops automatically add new hosts to the map ■...
Ngày tải lên : 08/08/2014, 21:23
  • 70
  • 429
  • 0
hack proofing linux a Guide to Open Source Security phần 4 pdf

hack proofing linux a Guide to Open Source Security phần 4 pdf

... creates its database, it is said to enter database initialization mode. 5. You can then set Tripwire to rescan these files and compare their signa- tures to the signatures stored in the database.This ... generally extends your logging capability by placing additional information into a log file or into a database. Alerting An IDS often has the ability to send alert messages to...
Ngày tải lên : 08/08/2014, 21:23
  • 71
  • 303
  • 0
hack proofing linux a Guide to Open Source Security phần 5 docx

hack proofing linux a Guide to Open Source Security phần 5 docx

... data? A: As you have learned, packet sniffing is a powerful tool. It allows malicious hackers to capture packets that contain passwords and usernames.The only way to protect yourself against hackers ... directories, and databases. ; An IDS can act as a supplement to a firewall, because it can help you monitor traffic on the internal network. Sometimes it may be useful to place an...
Ngày tải lên : 08/08/2014, 21:23
  • 70
  • 231
  • 0
hack proofing linux a Guide to Open Source Security phần 7 docx

hack proofing linux a Guide to Open Source Security phần 7 docx

... Red Hat Package Manager (RPM) packages are already installed (you may need to update them later in this section). To check if an RPM is installed, enter rpm -qa | grep rpm_name .To install an RPM, ... time and trouble by acquiring FreeS/WAN through one of these alternate sources. Some available script sets are designed to allow you to manage firewalls that also serve as FreeS/WAN IPSe...
Ngày tải lên : 08/08/2014, 21:23
  • 77
  • 326
  • 0
hack proofing linux a Guide to Open Source Security phần 8 doc

hack proofing linux a Guide to Open Source Security phần 8 doc

... Ipchains and Iptables also allow you to configure your Linux router to masquerade traffic (i.e., to rewrite IP headers so that a packet appears to originate from a certain host), and/or to examine ... own dynamic database. If this database senses a number of ports that have been scanned in a row, the firewall can take action. Some actions the firewall can take may include auto...
Ngày tải lên : 08/08/2014, 21:23
  • 70
  • 319
  • 0
hack proofing linux a Guide to Open Source Security phần 9 docx

hack proofing linux a Guide to Open Source Security phần 9 docx

... rules database One of the common moves by a hacker is to alter the rules database in subtle ways that make it easier for the hacker to gain access to the network. Check your rules and compare them ... problems, because it will require you to ensure that this daemon is not sub- ject to bugs that can cause a security problem. Any daemon, such as Cron, that acts automatically can...
Ngày tải lên : 08/08/2014, 21:23
  • 65
  • 338
  • 0
hack proofing linux a Guide to Open Source Security phần 10 pps

hack proofing linux a Guide to Open Source Security phần 10 pps

... that all Application layer data is encrypted. No passwords, usernames, or usable data www.syngress.com Chapter 7 Continued 138 _linux_ AppB 6/ 20/01 9:55 AM Page 62 4 Hack Proofing Linux Fast Track ... database. Determine if any unauthorized changes have been made to your database. Use the diff command to compare the two files to see if any changes have occurred.You may also use md5...
Ngày tải lên : 08/08/2014, 21:23
  • 70
  • 268
  • 0

Xem thêm

Từ khóa: