108
H
K
hacker ethic, 17
Kerberos
hackers
NIS, 50
black hat
(See cracker)
definition, 17
L
grey hat, 17
legal issues, 96
white hat, 17
lpd, 40
hardware, 75
lsof, 56
and security, 78
laptops, 78
servers, 78
M
workstations, 78
md5sum, 98
I
N
IDS
Nessus, 85
(See intrusion detection systems)
Netfilter, 68
incident response, 95
additional resources, 73
and legal issues, 96
Netfilter 6, 72
collecting evidence, 97
netstat, 56
computer emergency response team (CERT), 96
network services, 40
creating a plan, 95
identifying and configuring, 40
defining, 95
risks, 40
gathering post breach information, 97
buffer overflow, 40
implementation, 96
denial of service, 40
investigation, 97
script vulnerability, 40
post mortem, 97
network topologies, 75
reporting the incident, 100
linear bus, 75
restoring and recovering resources, 99
ring, 75
incident response plan, 95
star, 75
insecure services, 41
networks, 75
rsh, 42
and security, 75
telnet, 42
de militarized zones (DMZs), 77
vsftpd, 42
hubs, 76
wu ftpd, 42
segmentation, 77
introduction, v
switches, 76
other Red Hat Linux manuals, v
wireless, 76
topics, v
NFS, 50
and Sendmail, 55
intrusion detection systems, 89
network design, 50
and log files, 89
syntax errors, 51
defining, 89
NIS
host based, 89
introducing, 48
network based, 92
iptables, 50
Snort, 93
Kerberos, 50
RPM Package Manager (RPM), 90
NIS domain name, 49
Tripwire, 90
planning network, 49
types, 89
securenets, 49
ip6tables, 72
static ports, 50
iptables, 68
nmap, 56, 83
additional resources, 73
command line version, 83
using, 68
graphical version, 84
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Inexpensive Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Jsp Hosting
Cheap Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved