Securing & Optimizing Linux: The Hacking Solution
โ Scribed by Gerhard Mourani
- Publisher
- Open Network Architecture
- Year
- 2002
- Tongue
- English
- Leaves
- 1208
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network.
The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments.
๐ SIMILAR VOLUMES
1. Security and controls -- 2. Hacking the system -- 3. Hacking the users -- 4. Care and maintenance.
1. Security and controls -- 2. Hacking the system -- 3. Hacking the users -- 4. Care and maintenance.
If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box?
This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.