𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Hacker Linux Uncovered

✍ Scribed by Michael Flenov


Publisher
A-List Publishing
Year
2005
Tongue
English
Leaves
500
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.

✦ Subjects


Π‘ΠΈΠ±Π»ΠΈΠΎΡ‚Π΅ΠΊΠ°;ΠšΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Π°Ρ Π»ΠΈΡ‚Π΅Ρ€Π°Ρ‚ΡƒΡ€Π°;Linux / Unix;


πŸ“œ SIMILAR VOLUMES


Hacker Debugging Uncovered (Uncovered Se
✍ Kris Kaspersky πŸ“‚ Library πŸ“… 2005 πŸ› A-List Publishing 🌐 English

Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in this debugger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstra

Hacker Disassembling Uncovered
✍ Kris Kaspersky πŸ“‚ Library πŸ“… 2003 πŸ› A-List Publishing 🌐 English

Text shows how to analyze programs without its source code, using a debugger and a disassembler. Covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. For intermediate to advanced level programmers.

Hacker Web Exploition Uncovered
✍ Marsel Nizamutdinov πŸ“‚ Library πŸ“… 2005 πŸ› Unknown 🌐 English

A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well a

Linux Hacker
✍ Mr Ajay Kumar Tiwari πŸ“‚ Library πŸ“… 2015 πŸ› CreateSpace Independent Publishing Platform 🌐 English

Linux Command Line Essentials What Linux is and How It Works How to Make the Most of Linux Command Line What hacking is. The truth about hacking What can hacking give you and the dangers that comes with it. The two sides of hacking good vs bad The foundation needed to enter into the hacking l