tailieunhanh - Linux security Administrator Guide

As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. | Linux Security Administrator s Guide Dave Wreski daveỗnic. com 22 August 1998 This document is a general overview of security issues that face the administrator of Linux systems. It covers general security philosophy and a number of specific examples of how to better secure your Linux system from intruders. Also included are pointers to security related material and programs. Contents 1 Introduction. 6 New Versions of this Document. 6 Feedback . 7 Disclaimer. 7 Copyright Information. 7 2 Overview 7 Organization of This Document. 7 Host Security. 8 Network Security . 8 Security Through Obscurity. 9 Why Do We Need Security . 9 How Vulnerable Are We . 9 How Secure Is Secure . 9 What Are You Trying to Protect . 10 Developing A Security Policy. 11 Means of Securing Your Site. 12 Temporary Changes. 12 3 Network Security 12 Windows Networking. 12 Identify Gateway Machines. 13 Network Monitoring. 14 Network Configuration Files. 14 Check for Poor Topology Configuration . 15 Disable Unnecessary and Unauthorized Services. 15 Monitoring Network Services with TCP Wrappers . 15 Running Services in a chroot Environment. 16 Domain Name Service DNS Security. 16 CONTENTS 2 Network File System NFS Security. 17 Network Information Service NIS . 17 File Transport Protocol FTP . 17 Simple Mail Transport Protocol SMTP . 18 4 Host Security 18 Delete Unnecessary Packages. 18 Default System Configuration. 19 Make a Full Backup of Your Machine. 19 Backup Your Red Hat or Debian File Database. 19 Make Use of Your System Accounting Data. 19 Apply All New System Updates. 20 Creating New Accounts . 20 Root Security. 20 Workstations and DialUp Security. 21 Xll SVGA and display security. 22 Xll. 22 SVGA . 22 GGI Generic Graphics Interface project . 23 identd. 23 5 User System and Process Accounting 23 Using

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.