Оглавление файла ( /SECURITY/securityfaq.txt )
Improving the security of your Unix system. 1993 CONTENTS
1.2 THE INTERNET WORM 1.4 OTHER BREAK-INS 1.5 SECURITY IS IMPORTANT
2.1 ACCOUNT SECURITY 2.1.1 Passwords 2.1.1.1 Selecting Passwords 2.1.1.2 Password Policies 2.1.1.3 Checking Password Security 2.1.2 Expiration Dates 2.1.3 Guest Accounts 2.1.4 Accounts Without Passwords 2.1.5 Group Accounts and Groups 2.1.6 Yellow Pages 2.2 NETWORK SECURITY 2.2.1 Trusted Hosts 2.2.1.1 The hosts.equiv File 2.2.1.2 The .rhosts File 2.2.2 Secure Terminals 2.2.3 The Network File System 2.2.3.1 The exports File 2.2.3.3. The access= keyword specifies the list of hosts 2.2.3.2 The netgroup File 2.2.3.3 Restricting Super-User Access 2.2.4 FTP 2.2.4.1 Trivial FTP 2.2.5 Mail 2.2.6 Finger 2.2.7 Modems and Terminal Servers 2.2.8 Firewalls 2.3 FILE SYSTEM SECURITY 2.3.1 Setuid Shell Scripts 2.3.2 The Sticky Bit on Directories 2.3.3 The Setgid Bit on Directories 2.3.4 The umask Value 2.3.5 Encrypting Files 2.3.6 Devices 2.4 SECURITY IS YOUR RESPONSIBILITY
* SECTION 3 * MONITORING SECURITY
3.1 ACCOUNT SECURITY 3.1.1 The lastlog File 3.1.2 The utmp and wtmp Files 3.1.3 The acct File 3.2 NETWORK SECURITY 3.2.1 The syslog Facility 3.2.2 The showmount Command 3.3 FILE SYSTEM SECURITY 3.3.1 The find Command 3.3.1.1 Finding Setuid and Setgid Files 3.3.1.2 Finding World-Writable Files 3.3.1.3 Finding Unowned Files 3.3.1.4 Finding .rhosts Files 3.3.2 Checklists 3.3.3 Backups 3.4 KNOW YOUR SYSTEM 3.4.1 The ps Command 3.4.2 The who and w Commands 3.4.3 The ls Command 3.5 KEEP YOUR EYES OPEN
* SECTION 4 * SOFTWARE FOR IMPROVING SECURITY
4.1 OBTAINING FIXES AND NEW VERSIONS 4.1.1 Sun Fixes on UUNET 4.1.2 Berkeley Fixes 4.1.3 Simtel-20 and UUNET 4.1.4 Vendors 4.2 THE NPASSWD COMMAND 4.3 THE COPS PACKAGE 4.4 SUN C2 SECURITY FEATURES 4.5 KERBEROS
* SECTION 5 * KEEPING ABREAST OF THE BUGS
5.1 THE COMPUTER EMERGENCY RESPONSE TEAM 5.2 DDN MANAGEMENT BULLETINS 5.3 SECURITY-RELATED MAILING LISTS 5.3.1 Security 5.3.2 RISKS 5.3.3 TCP-IP 5.3.4 SUN-SPOTS, SUN-NETS, SUN-MANAGERS 5.3.5 VIRUS-L
* SECTION 6 * SUGGESTED READING
* SECTION 7 * CONCLUSIONS
REFERENCES APPENDIX A - SECURITY CHECKLIST
Художники - картинные галереи |
Music.lib.ru - mp3 Легально! Бесплатно! | Школа кожевенного мастерства |