tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 8

Open Source Security Tools : Practical Guide to Security Applications part 8. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 49 Wednesday June 23 2004 2 58 PM Considerations for Hardening Windows 49 Figure Sam Spade IP Block Output There are several other tools that are not the subject of this book such as Check cancels for USENET News and Decode URLs that you may find useful if you are developing a Web site. Sam Spade can give you UNIX-like capabilities in terms of network discovery. The next tool PuTTY gives you the capabilities of SSH another UNIX-based program for secure remote terminal access on Windows. PuTTY An SSH Client for Win d o ws PuTTY Author primary contact Sam Tatham Web site sgtatham putty Platforms Windows 95 98 ME NT 2000 XP Version reviewed .54b License MIT similar to BSD license Other resources See Help file or Web site Page 50 Wednesday June 23 2004 2 58 PM 50 Chapter 2 Operating System Tools One of these days Microsoft will get with the program and begin including a built-in SSH client with Windows. In the meantime PuTTY is an excellent SSH client for Windows and it also includes an enhanced encryption-enabled Telnet client. You can use PuTTY to securely communicate with any server running the SSH protocol. Installing and Running PuTTY Download the file from the Web site or get it from the CD-ROM that comes with this book and double-click on it to install it. PuTTY has a pretty clean interface and should be able to emulate almost all terminals. You can configure the port number you come in on if the SSH server is using a nonstandard port number. You can also fiddle with all the settings by using the menus on the left. You can log all your sessions to a text file which can be quite useful I used PuTTY to log all of the terminal session listings in this book . You can also mess with the configuration ad infinitum including which encryption protocols it will accept. It will even warn Figure PuTTY Main Screen Page 51 Wednesday June 23 2004 2 58 PM Considerations for Hardening .

TỪ KHÓA LIÊN QUAN