Linux Security HOWTO: Introduction
1. IntroductionThis document covers some of the main security issues that affect
Linux security. General philosophy and net born resources are
discussed.A number of other HOWTO documents overlap with security issues, and
those have been pointed to wherever appropriate.This document is NOT meant to be a up to date exploits document. Large
numbers of new exploits happen all the time. This document will tell
you where to look for such up to date information, and some general
methods to prevent such exploits from taking place.1.1 New Versions of this DocumentNew versions of this document will be periodically posted to
comp.os.linux.answers. They will also be added to the
various anonymous FTP sites who archive such information,
including:ftp://sunsite.unc.edu/pub/Linux/docs/HOWTOIn addition, you should generally be able to find this document
on the Linux Worldwide Web home page via:http://sunsite.unc.edu/mdw/linux.htmlFinally, the very latest version of this document should also be
available in various formats from:http://scrye.com/~kevin/lsh/1.2 FeedbackAll comments, error reports, additional information and criticism
of all sorts should be directed to:kevin@scrye.comanddave@nic.comNOTE: Please send your feedback to _both_ authors. Also, be sure and
include "Linux" "security" or "HOWTO" in your subject to avoid kevin's spam filter.1.3 DisclaimerNo liability for the contents of this documents can be accepted.
Use the concepts, examples and other content at your own risk.
Additionally, this is an early version, with many possibilities
for inaccuracies and errors.A number of the examples and descriptions use the RedHat(tm) package
layout and system setup. Your mileage may vary.As far as we know, only programs that under certain terms may be
used or evaluated for personal purposes will be described. Most
of the programs will be available complete with source under
GNU-like terms.1.4 Copyright InformationThis document is copyrighted (c)1998 Kevin Fenzi and Dave Wreski, and distributed under the following terms:Linux HOWTO documents may be reproduced and distributed in
whole or in part, in any medium physical or electronic, as long
as this copyright notice is retained on all copies. Commercial
redistribution is allowed and encouraged; however, the authors
would like to be notified of any such distributions.All translations, derivative works, or aggregate works
incorporating any Linux HOWTO documents must be covered under
this copyright notice. That is, you may not produce a derivative
work from a HOWTO and impose additional restrictions on its
distribution. Exceptions to these rules may be granted under
certain conditions; please contact the Linux HOWTO coordinator at
the address given below.If you have questions, please contact Tim Bynum, the
Linux HOWTO coordinator, atlinux-howto@sunsite.unc.edu
e
Wyszukiwarka
Podobne podstrony:
security howto 7 bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufrysecurity howto 12 sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta sezbwv7n6y47gabon75tio6lcgxevwjrrm4eetasecurity howto 10 tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nqsecurity howto 13 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7thasecurity howto 3 zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3qsecurity howto 14 z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esqsecurity howto 2 chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogakysecurity howto 9 f7342fcwwas3fsaa4esqnbl3i7fjisuryfs5aci f7342fcwwas3fsaa4esqnbl3i7fjisuryfs5acisecurity howto osdc3t5dnaiuk2szi6fvz2cd2yqyvbvgf4wavay osdc3t5dnaiuk2szi6fvz2cd2yqyvbvgf4wavaysecurity howto 15 3zax2ehwxqawfacyqfs7solwqd6wh2ertk6x4ci 3zax2ehwxqawfacyqfs7solwqd6wh2ertk6x4cisecurity howto 4 oyn2jwy6vqxvea42zoci4csptsaomiur256qxpq oyn2jwy6vqxvea42zoci4csptsaomiur256qxpqsecurity howto 5 jbeju3l27fjg2sip3a2spfnomfbvrsveawv6qta jbeju3l27fjg2sip3a2spfnomfbvrsveawv6qtasecurity howto 11 li7hwsfwf7ghxwhasbk4mhnborud6d6pibtdg3i li7hwsfwf7ghxwhasbk4mhnborud6d6pibtdg3isecuring debian howto enbootdisk howto pl 8PPP HOWTO pl 6 (2)NIS HOWTO pl 1 (2)kernel howto 3 clbigwpagydoy3epnkmic3ys7wlqwsg4rlwwgvq clbigwpagydoy3epnkmic3ys7wlqwsg4rlwwgvqconsultants howto 18więcej podobnych podstron