?? unx44.htm
字號:
<HTML>
<HEAD>
<TITLE>UNIX Unleashed unx44.htm</TITLE>
<LINK REL="ToC" HREF="index.htm">
<LINK REL="Next" HREF="unxpt8au.htm">
<LINK REL="Previous" HREF="unx43.htm"></HEAD>
<BODY TEXT="#000000" LINK="#0000FF" VLINK="#800080" bgcolor=white>
<P><A HREF="unx43.htm"><IMG SRC="bluprev.gif" WIDTH = 32 HEIGHT = 32 BORDER = 0 ALT="Previous Page"></A>
<A HREF="index.htm"><IMG SRC="blutoc.gif" WIDTH = 32 HEIGHT = 32 BORDER = 0 ALT="TOC"></A>
<A HREF="unxpt8au.htm"><IMG SRC="blunext.gif" WIDTH = 32 HEIGHT = 32 BORDER = 0 ALT="Next Page"></A>
<A HREF="index.htm"><IMG SRC="bluprev.gif" WIDTH = 32 HEIGHT = 32 BORDER = 0 ALT="Home"></A>
</P><UL>
<LI>
<A HREF="#I1">44 — UNIX System Security</A></LI>
<UL>
<UL>
<UL>
<UL>
<LI>
<A HREF="#I3">By Jeff Smith</A></LI></UL></UL>
<LI>
<A HREF="#I4">Kinds of Attacks and Their Consequences</A></LI>
<UL>
<LI>
<A HREF="#I5">Physical Security</A></LI>
<LI>
<A HREF="#I6">Social Engineering</A></LI>
<LI>
<A HREF="#I7">Dumpster-Diving Attacks</A></LI>
<LI>
<A HREF="#I8">Network- and Phone-Based Attacks</A></LI></UL>
<LI>
<A HREF="#I9">Security Policies</A></LI>
<LI>
<A HREF="#I10">User Authentication</A></LI>
<UL>
<LI>
<A HREF="#I11">Picking Good Passwords</A></LI>
<LI>
<A HREF="#I12">Password screening</A></LI>
<LI>
<A HREF="#I13">Password for System Accounts</A></LI>
<LI>
<A HREF="#I14">Password Aging</A></LI>
<LI>
<A HREF="#I15">Shadow Passwords</A></LI>
<LI>
<A HREF="#I16">One-time Passwords</A></LI>
<UL>
<LI>
<A HREF="#I17">Smart Cards</A></LI>
<LI>
<A HREF="#I18">S/Key</A></LI></UL>
<LI>
<A HREF="#I19">Equivalent Hosts and .rhosts Authentication</A></LI>
<LI>
<A HREF="#I20">.rhosts and the superuser account</A></LI>
<LI>
<A HREF="#I21">.netrc authentication</A></LI></UL>
<LI>
<A HREF="#I22">File System Security</A></LI>
<UL>
<LI>
<A HREF="#I23">Backup Policies</A></LI></UL>
<LI>
<A HREF="#I24">Network Security</A></LI>
<UL>
<LI>
<A HREF="#I25">FTP</A></LI>
<LI>
<A HREF="#I26">sendmail</A></LI>
<LI>
<A HREF="#I27">Network File System (NFS)</A></LI>
<LI>
<A HREF="#I28">Network Information System (NIS)</A></LI>
<LI>
<A HREF="#I29">finger</A></LI>
<LI>
<A HREF="#I30">The Trivial File Transfer Protocol (TFTP)</A></LI></UL>
<LI>
<A HREF="#I31">Intrusion Detection</A></LI>
<UL>
<LI>
<A HREF="#I32">Message Digests</A></LI>
<LI>
<A HREF="#I33">C2 Auditing</A></LI>
<LI>
<A HREF="#I34">Program Wrappers</A></LI></UL>
<LI>
<A HREF="#I35">Disaster Recovery</A></LI>
<LI>
<A HREF="#I36">Security Tools</A></LI>
<UL>
<LI>
<A HREF="#I37">COPS</A></LI>
<LI>
<A HREF="#I38">TAMU Tiger</A></LI>
<LI>
<A HREF="#I39">SATAN</A></LI></UL>
<LI>
<A HREF="#I40">Firewalls and Bastion Hosts</A></LI>
<LI>
<A HREF="#I41">Kerberos</A></LI>
<LI>
<A HREF="#I42">Hardware Solutions</A></LI>
<UL>
<LI>
<A HREF="#I43">Dial-Back Modems</A></LI>
<LI>
<A HREF="#I44">Encrypting EtherNet Hubs</A></LI>
<LI>
<A HREF="#I45">Filtering Routers</A></LI></UL>
<LI>
<A HREF="#I46">Finding More Information</A></LI>
<UL>
<LI>
<A HREF="#I47">USENET News</A></LI>
<LI>
<A HREF="#I48">CERT/CC</A></LI>
<LI>
<A HREF="#I49">FIRST</A></LI>
<LI>
<A HREF="#I50">Vendor Contacts</A></LI>
<LI>
<A HREF="#I51">Mailing Lists</A></LI>
<LI>
<A HREF="#I52">Conferences and Networking</A></LI>
<LI>
<A HREF="#I53">Online Information and Program Source Archives</A></LI>
<LI>
<A HREF="#I54">FTP and Other Information Archives</A></LI>
<LI>
<A HREF="#I55">Other Books</A></LI></UL>
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -