Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Securing Optimizing Linux the Ultimate Solution v2

Securing Optimizing Linux the Ultimate Solution v2

Ratings: (0)|Views: 27 |Likes:
Published by api-3730515

More info:

Published by: api-3730515 on Oct 15, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

1
This book is dedicated to OpenNA staff. Thanks, guys (no-gender)!!
--Gerhard Mourani
Copyright \u00a9 2001 by Gerhard Mourani and Open Network Architecture, Inc.
This material may be distributed only subject to the terms and conditions set forth in the Open
Publication License, V1.0 or later (http://www.opencontent.org/openpub/).

Distribution of the work or derivative of the work in any standard (paper) book form for
commercial purposes are prohibited unless prior permission is obtained from the copyright holder.
Please note even if I, Gerhard Mourani have the copyright, I don't control commercial printing of
the book. Please contact OpenNA @ http://www.openna.com/ if you have questions concerning
such matters.

This publication is designed to provide accurate and authoritative information in regard to the
subject matter covered. It is sold with the understanding that some grammatical mistakes could
have occurred but this won\u2019t jeopardize the content or the issue raised herewith.

Title: Securing and Optimizing Linux: The Ultimate Solution
Page Count:855
Version:2.0
Last Revised:2 001- 06- 10
Publisher: Open Network Architecture, Inc.
Editor: Ted Nackad
Text Design & Drawings (Graphics): Bruno Mourani
Printing History: June 2000: First Publication.

Author's: Gerhard Mourani
Mail:g m o u ran i@o p en n a.co m
Website:h t t p : //w w w .o p en n a.co m /

National Library Act. R.S., c. N-11, s. 1.
Legal Deposit, 2001
Securing and Optimizing Linux: The Ultimate Solution / Open Network Architecture.
Published by Open Network Architecture, Inc., 11090 Drouart, Montreal, H3M 2S3, Canada.
Includes Index.
ISBN 0-9688793-0-6
Latest version of this book

New version of this book (version 3.0 title \u201cSecuring & Optimizing Linux: The Hacking Solution\u201d) is available on our website but not as a free document. If you like this book and are interested to get the latest version, then go toh ttp: //www. ope nna .c om /.

2
Overview
Part I Installation Related Reference
Chapter 1
Introduction
Chapter 2
Installing a Linux Server
Part II Security and Optimization Related Reference
Chapter 3
General System Security
Chapter 4
Linux Pluggable Authentication Modules
Chapter 5
General System Optimization
Chapter 6
Kernel Security & Optimization
Part III Networking Related Reference
Chapter 7
TCP/IP Network Management
Chapter 8
Firewall IPTABLES Packet Filter
Chapter 9
Firewall IPTABLES Masquerading & Forwarding
Part IV Cryptography & Authentication Related Reference
Chapter 10
GnuPG
Chapter 11
OpenSSL
Chapter 12
OpenSSH
Part V Monitoring & System Integrity Related Reference
Chapter 13
sXid
Chapter 14
Logcheck
Chapter 15
PortSentry
Chapter 16
Tripwire
Chapter 17
Xinetd
Part VI Management & Limitation Related Reference
Chapter 18
Quota
Part VII Domain Name System Related Reference
Chapter 19
ISC BIND/DNS
Part VIII Mail Transfer Agent Related Reference
Chapter 20
Sendmail
Chapter 21
qmail
Part IX Internet Message Access Protocol Related Reference
Chapter 22
UW IMAP
3
Part X Database Server Related Reference
Chapter 23
MySQL
Chapter 24
PostgreSQL
Chapter 25
OpenLDAP
Part XI Gateway Server Related Reference
Chapter 26
Squid
Chapter 27
FreeS/WAN VPN
Part XII Other Server Related Reference
Chapter 28
Wu-ftpd
Chapter 29
Apache
Chapter 30
Samba
Part XIII Backup Related Reference
Chapter 31
Backup & restore procedures
Part XIII APPENDIXES
APPENDIX A
Tweaks, Tips and Administration Tasks
APPENDIX B
Contributor Users
APPENDIX C
Obtaining Requests for Comments (RFCs)
APPENDIX D
Port list

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads