security howto 11 li7hwsfwf7ghxwhasbk4mhnborud6d6pibtdg3i li7hwsfwf7ghxwhasbk4mhnborud6d6pibtdg3i LI7HWSFWF7GHXWHASBK4MHNBORUD6D6PIBTDG3I


Linux Security HOWTO: Security Sources 11. Security SourcesThere are a LOT of good sites out there for UNIX security in general and Linux security specifically. It's very important to subscribe to one (or more) of the security mailing lists and keep current on security fixes. Most of these lists are very low volume, and very informative.11.1 FTP sitesCERT is the Computer Emergency Response Team. They often send out alerts of current attacks and fixes. cert.orgReplay has archives of many security programs. Since they are outside the US, they don't need to obey US crypto restrictions. replay.comMatt Blaze is the author of CFS and a great security advocate. Matt Blaze's stufftue.nl is a great security ftp site in the Netherlands. ftp.win.tue.nl11.2 Web SitesThe Hacker FAQ is a FAQ about hackers: The Hacker FAQThe COAST archive has a large number of unix security programs and information: COASTRootshell.com is a great site for seeing what exploits are currently being used by crackers: rootshell.com exploitsBUGTRAQ puts out advisories on security issues: BUGTRAQ archivesCERT, the Computer Emergency Response Team, puts out advisories on common attacks on unix platforms: CERT homeDan Farmer is the author of SATAN and many other security tools, his home site has some interesting security survey information as well as security tools: Dan Farmers trouble.orgThe Linux security WWW is a good site for Linux security information: Linux Security WWWReptile has lots of good Linux security information on his site: Reptiles Linux Security PageInfilsec has a vulnerability engine that can tell you what vunerabilities affect a specific platform: Infilsec vunerability engineCIAC sends out periodic security bulitins on common exploits: CIAC bulitinsA good starting point for Linux Pluggable Authentication modules can be found at http://www.kernel.org/pub/linux/libs/pam/.11.3 Mailing ListsBugtraq: To subscribe to bugtraq, send mail to listserv@netspace.org containing the message body subscribe bugtraq. (see links above for archives).CIAC: Send e-mail to: majordomo@tholia.llnl.gov In the BODY (not subject) of the message put (either or both): subscribe ciac-bulletin11.4 Books - Printed Reading Material.There are a number of good security books out there. This section lists a few of them. In addition to the security specify books, security is covered in a number of other books on system administration.Building Internet Firewalls By D. Brent Chapman & Elizabeth D. Zwicky1st Edition September 1995ISBN: 1-56592-124-0Practical UNIX & Internet Security, 2nd Edition By Simson Garfinkel & Gene Spafford2nd Edition April 1996ISBN: 1-56592-148-8Computer Security Basics By Deborah Russell & G.T. Gangemi, Sr.1st Edition July 1991ISBN: 0-937175-71-4Linux Network Administrator's Guide By Olaf Kirch1st Edition January 1995ISBN: 1-56592-087-2PGP: Pretty Good Privacy By Simson Garfinkel1st Edition December 1994ISBN: 1-56592-098-8Computer Crime A Crimefighter's Handbook By David Icove, Karl Seger & William VonStorch (Consulting Editor Eugene H. Spafford)1st Edition August 1995ISBN: 1-56592-086-4 m

Wyszukiwarka

Podobne podstrony:
security howto 7 bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry
dosemu howto 11
security howto 12 sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta
keyboard and console howto 11 vgnkybra66nlyyuwyorp6pmp7kiq3bm3tj6fx2a
printing howto 11 xzvpoxixwzaebqrewztmnqtuzbagsoai3c6zhxy
multi disk howto 11 ja6hnecrgx7pa7pbsxxbkiuy26latgynwqgikxq
networking overview howto 11 birdddbhhxei3y75xn3dyxnxyf55mkjjwnxktuq
hardware howto 11 7f3esjthrtlmipoomc4gjgonc7i7yb5nqse4kaq
ham howto 11
bootdisk howto 11
security howto 10 tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq
security howto 13 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha
php howto 11
security howto 3 zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q
security howto 14 z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq
security howto 2 chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky
var howto 11 pdn4qa4yccq6b2wb23kkaavcip7joq3zs5djjsy pdn4qa4yccq6b2wb23kkaavcip7joq3zs5djjsy

więcej podobnych podstron