亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? almost everything you ever wanted to know about security (but.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
        Almost Everything You Ever Wanted To Know About Security*                       *(but were afraid to ask!)This document is meant to answer some of the questions which regularlyappear in the Usenet newsgroups "comp.security.misc" and "alt.security",and is meant to provide some background to the subject for newcomers tothat newsgroup.This FAQ is maintained by Alec Muffett (aem@aber.ac.uk, uknet!aber!aem),with contributions from numerous others [perhaps].  The views expressedin the document are the personal views of the author(s), and it shouldnot be inferred that they are necessarily shared by anyone with whom theauthor(s) are now, or ever may be, associated.Many thanks go to (in no particular order): Steve Bellovin, Matt Bishop,Mark Brader, Ed DeHart, Dave Hayes, Jeffrey Hutzelman, William LeFebvre,Wes Morgan, Rob Quinn, Chip Rosenthal, Wietse Venema, Gene Spafford,John Wack and Randall Atkinson.Disclaimer: Every attempt is made to ensure that the informationcontained in this FAQ is up to date and accurate, but no responsibilitywill be accepted for actions resulting from information gained herein.Questions which this document addresses:Q.1 What are alt.security and comp.security.misc for?Q.2 Whats the difference between a hacker and a cracker?Q.3 What is "security through obscurity"Q.4 What makes a system insecure?Q.5 What tools are there to aid security?Q.6 Isn't it dangerous to give cracking tools to everyone?Q.7 Where can I get these tools?Q.8 Why and how do systems get broken into?Q.9 Who can I contact if I get broken into?Q.10 What is a firewall?Q.11 Why shouldn't I use setuid shell scripts?Q.12 Why shouldn't I leave "root" permanently logged on the console?Q.13 Why shouldn't I create Unix accounts with null passwords?Q.14 What security holes are associated with X-windows (and other WMs)?Q.15 What security holes are associated with NFS?Q.16 How can I generate safe passwords?Q.17 Why are passwords so important?Q.18 How many possible passwords are there?Q.19 Where can I get more information?Q.20 How silly can people get?---------------------------------------------------------------------------Q.1 What are alt.security and comp.security.misc for?Comp.security.misc is a forum for the discussion of computer security,especially those relating to Unix (and Unix like) operating systems.Alt.security used to be the main newsgroup covering this topic, as wellas other issues such as car locks and alarm systems, but with thecreation of comp.security.misc, this may change.This FAQ will concentrate wholly upon computer related security issues.The discussions posted range from the likes of "What's such-and-suchsystem like?" and "What is the best software I can use to do so-and-so"to "How shall we fix this particular bug?", although there is often alow signal to noise ratio in the newsgroup (a problem which this FAQhopes to address).The most common flamewars start when an apparent security novice posts amessage saying "Can someone explain how the such-and-such security holeworks?" and s/he is immediately leapt upon by a group of self appointedpeople who crucify the person for asking such an "unsound" question in apublic place, and flame him/her for "obviously" being a cr/hacker.Please remember that grilling someone over a high flame on the groundsthat they are "a possible cr/hacker" does nothing more than generate alot of bad feeling.  If computer security issues are to be dealt with inan effective manner, the campaigns must be brought (to a large extent)into the open.Implementing computer security can turn ordinary people into rampagingparanoiacs, unable to act reasonably when faced with a new situation.Such people take an adversarial attitude to the rest of the human race,and if someone like this is in charge of a system, users will rapidlyfind their machine becoming more restrictive and less friendly (fun?) touse.This can lead to embarrasing situations, eg: (in one university) banninga head of department from the college mainframe for using a networkutility that he wasn't expected to.  This apparently required a lot ofexplaining to an unsympathetic committee to get sorted out.A more sensible approach is to secure a system according to its needs,and if its needs are great enough, isolate it completely.  Please, don'tlose your sanity to the cause of computer security; it's not worth it.Q.2 What's the difference between a hacker and a cracker?Lets get this question out of the way right now:On USENET, calling someone a "cracker" is an unambiguous statement thatsome person persistently gets his/her kicks from breaking from intoother peoples computer systems, for a variety of reasons.  S/He may posesome weak justification for doing this, usually along the lines of"because it's possible", but most probably does it for the "buzz" ofdoing something which is illicit/illegal, and to gain status amongst apeer group.Particularly antisocial crackers have a vandalistic streak, and deletefilestores, crash machines, and trash running processes in pursuit oftheir "kicks".The term is also widely used to describe a person who breaks copyprotection software in microcomputer applications software in order tokeep or distribute free copies.On USENET, calling someone a "hacker" is usually a statement that saidperson holds a great deal of knowledge and expertise in the field ofcomputing, and is someone who is capable of exercising this expertisewith great finesse.  For a more detailed definition, readers arereferred to the Jargon File [Raymond].In the "real world", various media people have taken the word "hacker"and coerced it into meaning the same as "cracker" - this usageoccasionally appears on USENET, with disastrous and confusing results.Posters to the security newsgroups should note that they currently riska great deal of flamage if they use the word "hacker" in place of"cracker" in their articles.NB: nowhere in the above do I say that crackers cannot be true hackers.It's just that I don't say that they are...Q.3 What is "security through obscurity"Security Through Obscurity (STO) is the belief that a system of any sortcan be secure so long as nobody outside of its implementation group isallowed to find out anything about its internal mechanisms.  Hidingaccount passwords in binary files or scripts with the presumption that"nobody will ever find it" is a prime case of STO.STO is a philosophy favoured by many bureaucratic agencies (military,governmental, and industrial), and it used to be a major method ofproviding "pseudosecurity" in computing systems.Its usefulness has declined in the computing world with the rise of opensystems, networking, greater understanding of programming techniques, aswell as the increase in computing power available to the average person.The basis of STO has always been to run your system on a "need to know"basis.  If a person doesn't know how to do something which could impactsystem security, then s/he isn't dangerous.Admittedly, this is sound in theory, but it can tie you into trusting asmall group of people for as long as they live.  If your employees getan offer of better pay from somewhere else, the knowledge goes withthem, whether the knowledge is replaceable or not.  Once the secret getsout, that is the end of your security.Nowadays there is also a greater need for the ordinary user to knowdetails of how your system works than ever before, and STO falls down aas a result.  Many users today have advanced knowledge of how theiroperating system works, and because of their experience will be able toguess at the bits of knowledge that they didn't "need to know".  Thisbypasses the whole basis of STO, and makes your security useless.Hence there is now a need is to to create systems which attempt to bealgorithmically secure (Kerberos, Secure RPC), rather than justphilosophically secure.  So long as your starting criteria can be met,your system is LOGICALLY secure."Shadow Passwords" (below) are sometimes dismissed as STO, but this isincorrect, since (strictly) STO depends on restricting access to analgorithm or technique, whereas shadow passwords provide security byrestricting access to vital data.Q.4 What makes a system insecure?Switching it on.  The adage usually quoted runs along these lines: "The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards.  Even then, I wouldn't stake my life on it."(the original version of this is attributed to Gene Spafford)A system is only as secure as the people who can get at it.  It can be"totally" secure without any protection at all, so long as its continuedgood operation is important to everyone who can get at it, assuming allthose people are responsible, and regular backups are made in case ofhardware problems.  Many laboratory PC's quite merrily tick away thehours like this.The problems arise when a need (such as confidentiality) has to befulfilled.  Once you start putting the locks on a system, it is fairlylikely that you will never stop.Security holes manifest themselves in (broadly) four ways:1) Physical Security Holes.- Where the potential problem is caused by giving unauthorised personsphysical access to the machine, where this might allow them to performthings that they shouldn't be able to do.A good example of this would be a public workstation room where it wouldbe trivial for a user to reboot a machine into single-user mode and muckaround with the workstation filestore, if precautions are not taken.Another example of this is the need to restrict access to confidentialbackup tapes, which may (otherwise) be read by any user with access tothe tapes and a tape drive, whether they are meant to have permission ornot.2) Software Security Holes- Where the problem is caused by badly written items of "privledged"software (daemons, cronjobs) which can be compromised into doing thingswhich they shouldn't oughta.The most famous example of this is the "sendmail debug" hole (seebibliography) which would enable a cracker to bootstrap a "root" shell.This could be used to delete your filestore, create a new account, copyyour password file, anything.(Contrary to popular opinion, crack attacks via sendmail were not justrestricted to the infamous "Internet Worm" - any cracker could do thisby using "telnet" to port 25 on the target machine.  The story behind asimilar hole (this time in EMACS) is described in [Stoll].)New holes like this appear all the time, and your best hopes are to:  a: try to structure your system so that as little software as possible  runs with root/daemon/bin privileges, and that which does is known to  be robust.  b: subscribe to a mailing list which can get details of problems  and/or fixes out to you as quickly as possible, and then ACT when you  receive information.3) Incompatible Usage Security Holes- Where, through lack of experience, or no fault of his/her own, theSystem Manager assembles a combination of hardware and software whichwhen used as a system is seriously flawed from a security point of view.It is the incompatibility of trying to do two unconnected but usefulthings which creates the security hole.Problems like this are a pain to find once a system is set up andrunning, so it is better to build your system with them in mind.  It'snever too late to have a rethink, though.Some examples are detailed below; let's not go into them here, it wouldonly spoil the surprise.4) Choosing a suitable security philosophy and maintaining it.>From: Gene Spafford <spaf@cs.purdue.edu>>The fourth kind of security problem is one of perception and>understanding.  Perfect software, protected hardware, and compatible>components don't work unless you have selected an appropriate security>policy and turned on the parts of your system that enforce it.  Having>the best password mechanism in the world is worthless if your users>think that their login name backwards is a good password! Security is>relative to a policy (or set of policies) and the operation of a system>in conformance with that policy.Q.5 What tools are there to aid security?1) "COPS"Managed by Dan Farmer, this is a long established suite of shell scriptswhich forms an extensive security testing system; There is a rudimentarypassword cracker, and routines to check the filestore for suspiciouschanges in setuid programs, others to check permissions of essentialsystem and user files, and still more to see whether any system softwarebehaves in a way which could cause problems.The software comes in two versions - one written in Perl and one(largely equivalent) written in shell scripts.  The latest version isvery up-to-date on Unix Security holes.2) "Crack" (+ "UFC").Written by Alec Muffett, this is a program written with one purpose in

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本一区二区三区四区在线视频| 国产91精品一区二区麻豆网站| 亚洲狼人国产精品| 中文字幕制服丝袜一区二区三区| 午夜国产精品一区| 91视频一区二区三区| 欧美不卡一区二区三区| 亚洲午夜精品在线| 成人精品视频一区| 久久久亚洲精品石原莉奈| 亚洲欧美日韩国产综合| 国产伦精品一区二区三区视频青涩| 欧美亚洲综合一区| 综合久久久久久| 成人污污视频在线观看| 久久麻豆一区二区| 久久电影网站中文字幕 | 久久久久久久精| 亚洲午夜私人影院| 91麻豆6部合集magnet| 国产精品丝袜黑色高跟| 处破女av一区二区| 中文字幕五月欧美| 不卡av免费在线观看| 中文字幕乱码日本亚洲一区二区| 国产一区二区伦理片| 欧美tickling网站挠脚心| 午夜精品久久久久久久| 欧美日韩电影在线播放| 亚洲国产日韩综合久久精品| 91久久精品国产91性色tv| ...中文天堂在线一区| 91在线你懂得| 一区二区三区高清在线| 在线观看日韩电影| 亚洲一区二区三区小说| 欧美视频一区二区| 全国精品久久少妇| 亚洲精品一区二区三区福利 | 日韩天堂在线观看| 蜜桃久久av一区| 久久亚洲综合色| 高清beeg欧美| 一区二区三区四区乱视频| 精品视频1区2区3区| 亚洲18色成人| 日韩精品一区二区三区老鸭窝| 男女男精品视频| 久久久久久97三级| 91色九色蝌蚪| 日本不卡在线视频| 久久久精品影视| 99精品视频在线观看免费| 夜色激情一区二区| 555www色欧美视频| 国产成人免费视频精品含羞草妖精| 中文在线资源观看网站视频免费不卡 | 国产精品白丝jk白祙喷水网站| 久久九九久久九九| 色婷婷激情久久| 蜜桃久久久久久| 国产精品国产成人国产三级 | 91在线视频18| 男女男精品视频| 国产精品久久久久久久久免费樱桃| 欧美中文字幕一二三区视频| 奇米精品一区二区三区在线观看 | 国产精品嫩草影院com| 91国产丝袜在线播放| 久久99久久99精品免视看婷婷| 中文字幕一区免费在线观看| 欧美日韩国产免费| 懂色av一区二区三区免费观看| 亚洲一区二区不卡免费| 日本一区二区三区电影| 欧美三级欧美一级| caoporm超碰国产精品| 免费欧美日韩国产三级电影| 亚洲日本电影在线| 国产午夜精品福利| 这里只有精品99re| 在线免费一区三区| 成人一区二区三区在线观看| 日韩国产精品久久久| 综合在线观看色| 欧美精彩视频一区二区三区| 欧美一区二区三区啪啪| www.性欧美| 国产不卡在线播放| 九色综合国产一区二区三区| 亚洲一区二区中文在线| 国产精品久久久久天堂| 久久这里只精品最新地址| 欧美精品色一区二区三区| 96av麻豆蜜桃一区二区| 国产黄色91视频| 狠狠狠色丁香婷婷综合激情| 日本中文一区二区三区| 亚洲国产一区在线观看| 亚洲欧美另类小说| 中文字幕中文字幕中文字幕亚洲无线| 日韩视频在线你懂得| 欧美色老头old∨ideo| 色综合久久综合中文综合网| 成人福利视频在线看| 国产成人av一区| 国产91精品一区二区麻豆亚洲| 经典三级一区二区| 国产一区二区三区免费| 久久精品国产亚洲aⅴ| 蜜桃av一区二区三区| 日韩精品亚洲一区二区三区免费| 亚洲精品视频在线看| 亚洲精品视频在线| 亚洲综合免费观看高清在线观看| 综合色天天鬼久久鬼色| 一区精品在线播放| 亚洲精品菠萝久久久久久久| 亚洲欧洲制服丝袜| 亚洲一区二区成人在线观看| 亚洲一区日韩精品中文字幕| 亚洲一区二区三区影院| 欧美aⅴ一区二区三区视频| 久久99精品久久久久婷婷| 国产综合色产在线精品| 成av人片一区二区| 91猫先生在线| 欧美视频一区二区在线观看| 欧美高清hd18日本| 欧美电影免费观看高清完整版 | 亚洲欧洲日产国码二区| 樱桃视频在线观看一区| 亚洲欧美精品午睡沙发| 日韩国产高清影视| 国产美女av一区二区三区| 成人福利视频网站| 欧美午夜精品一区二区三区| 欧美一区二区三区在线观看| 久久一日本道色综合| 国产精品久久久久久久久免费相片 | 美女视频一区在线观看| 国产风韵犹存在线视精品| 99久久国产综合精品麻豆 | 99久久免费精品高清特色大片| 在线观看亚洲一区| 日韩精品一区二区三区视频在线观看| 国产日韩亚洲欧美综合| 亚洲欧美福利一区二区| 亚洲不卡一区二区三区| 精品一区二区免费| 色婷婷精品大在线视频 | 亚洲人成精品久久久久| 日本成人在线看| 97久久人人超碰| 91精品国产品国语在线不卡| 久久色成人在线| 天天综合色天天综合色h| 成人理论电影网| 欧美一级黄色片| 亚洲精品免费在线观看| 国产一区在线观看视频| 在线精品视频一区二区三四| 2021中文字幕一区亚洲| 亚洲一区二区综合| 成人免费精品视频| 日韩精品专区在线影院重磅| 中文字幕一区二区三区在线播放| 另类成人小视频在线| 欧美综合在线视频| 1000部国产精品成人观看| 国产一区不卡在线| 欧美日韩精品欧美日韩精品一| 国产精品久线观看视频| 久久国产精品露脸对白| 精品视频123区在线观看| 国产精品久99| 国产真实精品久久二三区| 欧美精品精品一区| 亚洲一二三区不卡| 91丨porny丨户外露出| 欧美国产日韩一二三区| 国内欧美视频一区二区 | 美女高潮久久久| 欧美高清你懂得| 亚洲成人一区在线| 在线精品视频一区二区三四| 亚洲女人****多毛耸耸8| 成人三级在线视频| 欧美极品少妇xxxxⅹ高跟鞋| 国产成人在线影院| 亚洲国产精品二十页| 国产一区二区三区国产| 精品国产一二三| 激情小说亚洲一区| 久久午夜色播影院免费高清| 狠狠色狠狠色综合| 久久久三级国产网站| 国产成都精品91一区二区三| 国产人久久人人人人爽| 成人av免费在线|