Download Linux Network Security (Administrator's Advantage Series) by Peter G(Peter G. Smith) Smith PDF

By Peter G(Peter G. Smith) Smith

Deal with. regrettably, in modern setting all networks are strength hacker objectives, from top-secret army study networks to small domestic LANs. most modern Linux documentation focuses extra on ease of use than safety, so Linux community safeguard specializes in securing Linux in a networked surroundings, the place the safety of the total community should be thought of, instead of simply remoted machines. this entire consultant presents a mixture of conception and functional innovations to educate directors tips on how to set up and use safety purposes, in addition to how they paintings and why they're invaluable of their networks. beginning with the necessity for safeguard and realizing the matter, the ebook teaches directors approximately packet filtering (firewalling) with iptables, hardening companies reminiscent of Apache, BIND, Sendmail, FTP, and MySQL to avoid assaults, community research, encryption, neighborhood defense, DoS assaults, and rootkits. Auditing networks for capability vulnerabilities and developing safe passwords also are explored. this is often the single publication that truly information how one can safe a Linux community.

Show description

Read Online or Download Linux Network Security (Administrator's Advantage Series) PDF

Best client-server systems books

No Fluff, Just Stuff Anthology

Twenty-seven weekends a yr, the No Fluff, simply Stuff convention rolls into one other city, that includes the world's top technical audio system and writers. Up earlier, you needed to visit one of many indicates to absorb their collective knowledge. Now, you could carry it within the palm of your hand. The No Fluff, simply Stuff Anthology represents subject matters provided at the journey, written by means of the audio system who created it.

Educational Algebra

Given its summary nature and the hugely syntactical competence required by means of symbolic algebra, learn on its instructing and studying needs to depend upon techniques that come with semiotic ideas and analyses that remember the background of algebraic rules, between others. academic Algebra: A Theoretical and Empirical procedure offers with a theoretical viewpoint at the examine of faculty algebra, during which either elements (semiotics and background) take place.

Open Source for Windows Administrators (Administrator's Advantage Series)

This publication introduces Microsoft? ® home windows? ® directors to the area of Open resource functions to be able to shop money and time. It offers readers with info and strategies for utilizing definitely the right Open resource purposes in various events, reminiscent of anti-spam, databases, e mail, websites, dossier sharing, note processing, spreadsheets, and extra.

Building Client/Server Applications with VB .NET: An Example-Driven Approach

Development Client/Server functions with VB . web: An Example-Driven strategy relies on free up 1. zero of the . internet Framework / unlock 1. zero of visible Studio . internet + . internet Framework carrier Pack 1. Jeff Levinson walks readers via the way to write a whole application—no “snippets” of code—and will express readers examples of ways, whilst, and why to accomplish a job.

Extra info for Linux Network Security (Administrator's Advantage Series)

Sample text

On busy mail servers (such as those owned by ISPs), unsolicited junk e-mail (spam) can have a similar effect, due to sheer volume. In a similar vein, any daemon that processes user requests (and that, after all, is the main purpose of a daemon) is susceptible to CPU/RAM-consuming attacks. This could be in the form of repeated requests to Apache, BIND, and so on. The good news is that Linux is fairly resilient to such attacks; they may slow the server down, but they are unlikely to cause it to crash.

ARP spoofing, which we covered in Chapter 2, gives users with less than honorable intentions the ability to divert the flow of traffic, while flooding of the CAM table can cause the switch to fail open, making it behave like a hub, forwarding frames on to every port. This may seem like undesirable behavior, but for the smooth running on the network, it's vital. Choosing switches that don't fail open means that if the CAM table becomes corrupted from nonmalicious causes, traffic flow on the network will grind to a halt.

Similar to the ping of death is the Teardrop, a fragmentation attack using UDP. The attacker creates a series of UDP fragments, each with overlapping offset fields. When the recipient attempts to reassemble these malformed fragments, it causes a kernel panic. 32 kernel patch, to be precise). SYN Flooding One of the most popular DoS attacks is the SYN flood, in which the victim is bombarded with connection requests, ultimately causing legitimate connections to be rejected, while consuming system resources.

Download PDF sample

Rated 5.00 of 5 – based on 49 votes