Securing & Optimizing Linux: The Hacking Solution
โ Scribed by Gerhard Mourani
- Publisher
- Open Network Architecture
- Year
- 2002
- Tongue
- English
- Leaves
- 1101
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux
1. Security and controls -- 2. Hacking the system -- 3. Hacking the users -- 4. Care and maintenance.
1. Security and controls -- 2. Hacking the system -- 3. Hacking the users -- 4. Care and maintenance.
If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box?
This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.