Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
68Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Securing Optimizing Linux the Hacking Solution Decrypted

Securing Optimizing Linux the Hacking Solution Decrypted

Ratings:

4.83

(12)
|Views: 2,862 |Likes:
Published by anon-782263
Securing Optimizing Linux The Hacking Solution
Securing Optimizing Linux The Hacking Solution

More info:

Published by: anon-782263 on May 14, 2007
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/01/2013

pdf

text

original

 
 
1
This book is dedicated to OpenNA staff. Thanks, guys (no-gender)!! --Gerhard Mourani 
This book is printed on acid-free paper with 85% recycled content, 15% post-consumer waste.Open Network Architecture is commited to using paper with the highest recycled contentavailable consistent with high quality.
Copyright © 2002 by Gerhard Mourani and Open Network Architecture, Inc.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording,scanning or otherwise, except as permitted by Canada Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copyfee to the copyright holders Gerhard Mourani and Open Network Architecture, Inc. 11090Drouart, Montreal, PQ H3M 2S3, (514) 978-6183, fax (514) 333-0236. Requests to the Publisher for permission should be addressed to the Publishing Manager, at Open Network Architecture,Inc., E-mail: books@openna.comThis publication is designed to provide accurate and authoritative information in regard to thesubject matter covered. It is sold with the understanding that some grammatical mistakes couldhave occurred but this won’t jeopardize the content or the issue raised herewith.
Title:
Securing and Optimizing Linux: The Hacking Solution
Page Count:
1100
Version:
3.0
Last Revised:
2002-06-26
Publisher:
Open Network Architecture, Inc.
Editor:
Ted Nackad
Text Design & Drawings (Graphics):
Bruno Mourani
Printing History:
June 2000: First Publication.
Author's:
Gerhard Mourani
Mail:
gmourani@openna.com
Website:
http://www.openna.com/
National Library Act.
R.S., c. N-11, s. 1.Legal Deposit, 2002Securing and Optimizing Linux: The Hacking Solution / Open Network Architecture, Inc.Published by Open Network Architecture, Inc., 11090 Drouart, Montreal, H3M 2S3, Canada.Includes Index.
ISBN 0-9688793-1-4
Printed in Canada
 
 2
Overview
Part I Installation Security
Chapter 1 IntroductionChapter 2 Installation Issues
Part II System Security & Optimization
Chapter 3 General SecurityChapter 4 Pluggable Authentication ModulesChapter 5 General OptimizationChapter 6 Kernel Security & OptimizationChapter 7 Process File System Management
Part III Network Security
Chapter 8 TCP/IP Network ManagementChapter 9 Firewall Basic ConceptChapter 10 GIPTables FirewallChapter 11 Squid Proxy Server Chapter 12 SquidGuard Filter Chapter 13 FreeS/WAN VPN
Part IV Cryptography & Authentication
Chapter 14 GnuPGChapter 15 OpenSSLChapter 16 OpenSSHChapter 17 Sudo
Part V Monitoring & System Integrity
Chapter 18 sXidChapter 19 LogSentryChapter 20 HostSentryChapter 21 PortSentryChapter 22 SnortChapter 23 Tripwire
Part VI Super-Server 
Chapter 24 UCSPI-TCPChapter 25 Xinetd
Part VII Management & Limitation
Chapter 26 NTPChapter 27 Quota
Part VIII Domain Name System & Dynamic Host Protocol
Chapter 28 ISC BIND & DNSChapter 29 ISC DHCP
Part IX Mail Transfer Agent Protocol
Chapter 30 EximChapter 31 Qmail
 
 
3
Part X Internet Message Access Protocol
Chapter 32 tpop3dChapter 33 UW IMAPChapter 34 Qpopper 
Part XI Anti-Spam & Anti-Virus
Chapter 35 SpamAssassinChapter 36 SophosChapter 37 AMaViS
Part XII Database Server 
Chapter 38 MySQLChapter 39 PostgreSQLChapter 40 OpenLDAP
Part XIII File Transfer Protocol
Chapter 41 ProFTPDChapter 42 vsFTPD
Part XIV Hypertext Transfer Protocol
Chapter 43 ApacheChapter 44 PHPChapter 45 Mod_Perl
Part XV NetBios Protocol
Chapter 46 Samba
Part XVI Backup
Chapter 47 Tar & Dump
Part XVII AppendixesAppendix A
Tweaks, Tips and Administration Tasks
Appendix B
Port list