security howto 1 kjo6rgmlpqtrvnnuy2jaa2bcaxpunloicb7tgva kjo6rgmlpqtrvnnuy2jaa2bcaxpunloicb7tgva KJO6RGMLPQTRVNNUY2JAA2BCAXPUNLOICB7TGVA


Linux Security HOWTO: Introduction 1. IntroductionThis document covers some of the main security issues that affect Linux security. General philosophy and net born resources are discussed.A number of other HOWTO documents overlap with security issues, and those have been pointed to wherever appropriate.This document is NOT meant to be a up to date exploits document. Large numbers of new exploits happen all the time. This document will tell you where to look for such up to date information, and some general methods to prevent such exploits from taking place.1.1 New Versions of this DocumentNew versions of this document will be periodically posted to comp.os.linux.answers. They will also be added to the various anonymous FTP sites who archive such information, including:ftp://sunsite.unc.edu/pub/Linux/docs/HOWTOIn addition, you should generally be able to find this document on the Linux Worldwide Web home page via:http://sunsite.unc.edu/mdw/linux.htmlFinally, the very latest version of this document should also be available in various formats from:http://scrye.com/~kevin/lsh/1.2 FeedbackAll comments, error reports, additional information and criticism of all sorts should be directed to:kevin@scrye.comanddave@nic.comNOTE: Please send your feedback to _both_ authors. Also, be sure and include "Linux" "security" or "HOWTO" in your subject to avoid kevin's spam filter.1.3 DisclaimerNo liability for the contents of this documents can be accepted. Use the concepts, examples and other content at your own risk. Additionally, this is an early version, with many possibilities for inaccuracies and errors.A number of the examples and descriptions use the RedHat(tm) package layout and system setup. Your mileage may vary.As far as we know, only programs that under certain terms may be used or evaluated for personal purposes will be described. Most of the programs will be available complete with source under GNU-like terms.1.4 Copyright InformationThis document is copyrighted (c)1998 Kevin Fenzi and Dave Wreski, and distributed under the following terms:Linux HOWTO documents may be reproduced and distributed in whole or in part, in any medium physical or electronic, as long as this copyright notice is retained on all copies. Commercial redistribution is allowed and encouraged; however, the authors would like to be notified of any such distributions.All translations, derivative works, or aggregate works incorporating any Linux HOWTO documents must be covered under this copyright notice. That is, you may not produce a derivative work from a HOWTO and impose additional restrictions on its distribution. Exceptions to these rules may be granted under certain conditions; please contact the Linux HOWTO coordinator at the address given below.If you have questions, please contact Tim Bynum, the Linux HOWTO coordinator, atlinux-howto@sunsite.unc.edu e

Wyszukiwarka

Podobne podstrony:
security howto 7 bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry
security howto 12 sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta
security howto 10 tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq
security howto 13 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha
security howto 3 zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q
security howto 14 z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq
security howto 2 chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky
security howto 9 f7342fcwwas3fsaa4esqnbl3i7fjisuryfs5aci f7342fcwwas3fsaa4esqnbl3i7fjisuryfs5aci
security howto osdc3t5dnaiuk2szi6fvz2cd2yqyvbvgf4wavay osdc3t5dnaiuk2szi6fvz2cd2yqyvbvgf4wavay
security howto 15 3zax2ehwxqawfacyqfs7solwqd6wh2ertk6x4ci 3zax2ehwxqawfacyqfs7solwqd6wh2ertk6x4ci
security howto 4 oyn2jwy6vqxvea42zoci4csptsaomiur256qxpq oyn2jwy6vqxvea42zoci4csptsaomiur256qxpq
security howto 5 jbeju3l27fjg2sip3a2spfnomfbvrsveawv6qta jbeju3l27fjg2sip3a2spfnomfbvrsveawv6qta
security howto 11 li7hwsfwf7ghxwhasbk4mhnborud6d6pibtdg3i li7hwsfwf7ghxwhasbk4mhnborud6d6pibtdg3i
securing debian howto en
bootdisk howto pl 8
PPP HOWTO pl 6 (2)
NIS HOWTO pl 1 (2)
kernel howto 3 clbigwpagydoy3epnkmic3ys7wlqwsg4rlwwgvq clbigwpagydoy3epnkmic3ys7wlqwsg4rlwwgvq
consultants howto 18

więcej podobnych podstron