Linux Network Security (Administrator's Advantage Series) by Peter G(Peter G. Smith) Smith

By Peter G(Peter G. Smith) Smith

Deal with. regrettably, in ultra-modern surroundings all networks are power hacker ambitions, from top-secret army examine networks to small domestic LANs. most present Linux documentation focuses extra on ease of use than safety, so Linux community safety makes a speciality of securing Linux in a networked setting, the place the safety of the complete community should be thought of, instead of simply remoted machines. this entire advisor presents a mixture of thought and functional suggestions to educate directors tips to set up and use safeguard purposes, in addition to how they paintings and why they're useful of their networks. beginning with the necessity for defense and knowing the matter, the e-book teaches directors approximately packet filtering (firewalling) with iptables, hardening companies reminiscent of Apache, BIND, Sendmail, FTP, and MySQL to avoid assaults, community research, encryption, neighborhood safety, DoS assaults, and rootkits. Auditing networks for capability vulnerabilities and growing safe passwords also are explored. this is often the only ebook that actually info find out how to safe a Linux community.

Show description

Read Online or Download Linux Network Security (Administrator's Advantage Series) PDF

Similar client-server systems books

Microsoft Small Business Server 2003 Unleashed

While you're new to the realm of Microsoft Small company Server 2003, Microsoft Small enterprise Server 2003 Unleashed supplies you with real-world aid adventure as you start or discover your upgraded server. Written and reviewed through Small company Server MVPs, this e-book presents worthy insurance of Mac platform integration, in addition to the mixing of ISA 2004, SharePoint, FrontPage, trade, and SQL Server.

Microsoft Exchange Server 2007 (with SP1) - The Complete Reference

"Exchange specialists and Microsoft MVPs Richard Luckett, William Lefkovics, and Bharat Suneja have packed this e-book with useful suggestions, priceless details, and years of information and event. If you’re accountable for a number of facets of an alternate 2007-based messaging method, preserve this e-book shut, as you’ll be concerning it frequently!

How to Cheat at Configuring Exchange Server 2007 - Including Outlook Web, Mobile, and Voice Access

The suitable Reference for the Multitasked process AdministratorsThe new edition of alternate is an bold overhaul that attempts to stability the becoming wishes for functionality, fee effectiveness, and protection. For the common process administrator, it's going to current a tricky migration direction from past types and a vexing variety of new good points.

Microsoft SharePoint 2010 Administrator's Pocket Consultant

Moveable and specific, this pocket-sized consultant supplies prepared solutions for the daily management of SharePoint 2010. that includes easy-to-scan tables, step by step directions, and convenient lists, this booklet bargains the streamlined, basic details you must clear up difficulties and get the activity done-whether at your table or within the box!

Additional resources for Linux Network Security (Administrator's Advantage Series)

Sample text

This isn't generally a problem with UDP/ICMP flooding because the response isn't important; it does however present profound problems for TCP connections, and spoofing the source address in a TCP connection is the most profitable, with many services (such as the Berkley R* Suite) using host-based authentication. We mentioned the three-way handshake earlier in our discussion on SYN flooding, but left out some of the details. 17) of the three-way handshake. 17: Sequence number exchange during the three-way handshake.

Puta/. conf, and inetd is restarted—this is the attacker's means of reentry. nsys; killall -HUP inetd /bin/login is moved to /sbin/xlogin, and replaced with a trojaned version allowing any user to log in with the password stored (encrypted) in /etc/ttyhash. This rootkit is notable for two reasons: the netstat binary is broken, segfaulting when executed (due to an overflow in a strcpy, it would appear); and the ps binary is 31,336 bytes in size—one byte off of being 31,337 (cracker slang for the word "elite").

Not only does this allow snoopers to learn passwords and usernames, but it also allows them to view potentially sensitive data such as e-mail messages, and even to reconstitute files attached to e-mails or transmitted over FTP. Ethereal is a popular GUI-based packet sniffer for Linux, which provides an easy-to-read hierarchal view of captured traffic. 13 shows it in action, snooping in on an ftp session. 13: The Ethereal packet sniffer. 10 with MAC: 00:04:75:7D:56:1F on Iface: eth0 Loading plugins...

Download PDF sample

Rated 4.46 of 5 – based on 50 votes