亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? almost everything you ever wanted to know about security (but.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
        Almost Everything You Ever Wanted To Know About Security*                       *(but were afraid to ask!)This document is meant to answer some of the questions which regularlyappear in the Usenet newsgroups "comp.security.misc" and "alt.security",and is meant to provide some background to the subject for newcomers tothat newsgroup.This FAQ is maintained by Alec Muffett (aem@aber.ac.uk, uknet!aber!aem),with contributions from numerous others [perhaps].  The views expressedin the document are the personal views of the author(s), and it shouldnot be inferred that they are necessarily shared by anyone with whom theauthor(s) are now, or ever may be, associated.Many thanks go to (in no particular order): Steve Bellovin, Matt Bishop,Mark Brader, Ed DeHart, Dave Hayes, Jeffrey Hutzelman, William LeFebvre,Wes Morgan, Rob Quinn, Chip Rosenthal, Wietse Venema, Gene Spafford,John Wack and Randall Atkinson.Disclaimer: Every attempt is made to ensure that the informationcontained in this FAQ is up to date and accurate, but no responsibilitywill be accepted for actions resulting from information gained herein.Questions which this document addresses:Q.1 What are alt.security and comp.security.misc for?Q.2 Whats the difference between a hacker and a cracker?Q.3 What is "security through obscurity"Q.4 What makes a system insecure?Q.5 What tools are there to aid security?Q.6 Isn't it dangerous to give cracking tools to everyone?Q.7 Where can I get these tools?Q.8 Why and how do systems get broken into?Q.9 Who can I contact if I get broken into?Q.10 What is a firewall?Q.11 Why shouldn't I use setuid shell scripts?Q.12 Why shouldn't I leave "root" permanently logged on the console?Q.13 Why shouldn't I create Unix accounts with null passwords?Q.14 What security holes are associated with X-windows (and other WMs)?Q.15 What security holes are associated with NFS?Q.16 How can I generate safe passwords?Q.17 Why are passwords so important?Q.18 How many possible passwords are there?Q.19 Where can I get more information?Q.20 How silly can people get?---------------------------------------------------------------------------Q.1 What are alt.security and comp.security.misc for?Comp.security.misc is a forum for the discussion of computer security,especially those relating to Unix (and Unix like) operating systems.Alt.security used to be the main newsgroup covering this topic, as wellas other issues such as car locks and alarm systems, but with thecreation of comp.security.misc, this may change.This FAQ will concentrate wholly upon computer related security issues.The discussions posted range from the likes of "What's such-and-suchsystem like?" and "What is the best software I can use to do so-and-so"to "How shall we fix this particular bug?", although there is often alow signal to noise ratio in the newsgroup (a problem which this FAQhopes to address).The most common flamewars start when an apparent security novice posts amessage saying "Can someone explain how the such-and-such security holeworks?" and s/he is immediately leapt upon by a group of self appointedpeople who crucify the person for asking such an "unsound" question in apublic place, and flame him/her for "obviously" being a cr/hacker.Please remember that grilling someone over a high flame on the groundsthat they are "a possible cr/hacker" does nothing more than generate alot of bad feeling.  If computer security issues are to be dealt with inan effective manner, the campaigns must be brought (to a large extent)into the open.Implementing computer security can turn ordinary people into rampagingparanoiacs, unable to act reasonably when faced with a new situation.Such people take an adversarial attitude to the rest of the human race,and if someone like this is in charge of a system, users will rapidlyfind their machine becoming more restrictive and less friendly (fun?) touse.This can lead to embarrasing situations, eg: (in one university) banninga head of department from the college mainframe for using a networkutility that he wasn't expected to.  This apparently required a lot ofexplaining to an unsympathetic committee to get sorted out.A more sensible approach is to secure a system according to its needs,and if its needs are great enough, isolate it completely.  Please, don'tlose your sanity to the cause of computer security; it's not worth it.Q.2 What's the difference between a hacker and a cracker?Lets get this question out of the way right now:On USENET, calling someone a "cracker" is an unambiguous statement thatsome person persistently gets his/her kicks from breaking from intoother peoples computer systems, for a variety of reasons.  S/He may posesome weak justification for doing this, usually along the lines of"because it's possible", but most probably does it for the "buzz" ofdoing something which is illicit/illegal, and to gain status amongst apeer group.Particularly antisocial crackers have a vandalistic streak, and deletefilestores, crash machines, and trash running processes in pursuit oftheir "kicks".The term is also widely used to describe a person who breaks copyprotection software in microcomputer applications software in order tokeep or distribute free copies.On USENET, calling someone a "hacker" is usually a statement that saidperson holds a great deal of knowledge and expertise in the field ofcomputing, and is someone who is capable of exercising this expertisewith great finesse.  For a more detailed definition, readers arereferred to the Jargon File [Raymond].In the "real world", various media people have taken the word "hacker"and coerced it into meaning the same as "cracker" - this usageoccasionally appears on USENET, with disastrous and confusing results.Posters to the security newsgroups should note that they currently riska great deal of flamage if they use the word "hacker" in place of"cracker" in their articles.NB: nowhere in the above do I say that crackers cannot be true hackers.It's just that I don't say that they are...Q.3 What is "security through obscurity"Security Through Obscurity (STO) is the belief that a system of any sortcan be secure so long as nobody outside of its implementation group isallowed to find out anything about its internal mechanisms.  Hidingaccount passwords in binary files or scripts with the presumption that"nobody will ever find it" is a prime case of STO.STO is a philosophy favoured by many bureaucratic agencies (military,governmental, and industrial), and it used to be a major method ofproviding "pseudosecurity" in computing systems.Its usefulness has declined in the computing world with the rise of opensystems, networking, greater understanding of programming techniques, aswell as the increase in computing power available to the average person.The basis of STO has always been to run your system on a "need to know"basis.  If a person doesn't know how to do something which could impactsystem security, then s/he isn't dangerous.Admittedly, this is sound in theory, but it can tie you into trusting asmall group of people for as long as they live.  If your employees getan offer of better pay from somewhere else, the knowledge goes withthem, whether the knowledge is replaceable or not.  Once the secret getsout, that is the end of your security.Nowadays there is also a greater need for the ordinary user to knowdetails of how your system works than ever before, and STO falls down aas a result.  Many users today have advanced knowledge of how theiroperating system works, and because of their experience will be able toguess at the bits of knowledge that they didn't "need to know".  Thisbypasses the whole basis of STO, and makes your security useless.Hence there is now a need is to to create systems which attempt to bealgorithmically secure (Kerberos, Secure RPC), rather than justphilosophically secure.  So long as your starting criteria can be met,your system is LOGICALLY secure."Shadow Passwords" (below) are sometimes dismissed as STO, but this isincorrect, since (strictly) STO depends on restricting access to analgorithm or technique, whereas shadow passwords provide security byrestricting access to vital data.Q.4 What makes a system insecure?Switching it on.  The adage usually quoted runs along these lines: "The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards.  Even then, I wouldn't stake my life on it."(the original version of this is attributed to Gene Spafford)A system is only as secure as the people who can get at it.  It can be"totally" secure without any protection at all, so long as its continuedgood operation is important to everyone who can get at it, assuming allthose people are responsible, and regular backups are made in case ofhardware problems.  Many laboratory PC's quite merrily tick away thehours like this.The problems arise when a need (such as confidentiality) has to befulfilled.  Once you start putting the locks on a system, it is fairlylikely that you will never stop.Security holes manifest themselves in (broadly) four ways:1) Physical Security Holes.- Where the potential problem is caused by giving unauthorised personsphysical access to the machine, where this might allow them to performthings that they shouldn't be able to do.A good example of this would be a public workstation room where it wouldbe trivial for a user to reboot a machine into single-user mode and muckaround with the workstation filestore, if precautions are not taken.Another example of this is the need to restrict access to confidentialbackup tapes, which may (otherwise) be read by any user with access tothe tapes and a tape drive, whether they are meant to have permission ornot.2) Software Security Holes- Where the problem is caused by badly written items of "privledged"software (daemons, cronjobs) which can be compromised into doing thingswhich they shouldn't oughta.The most famous example of this is the "sendmail debug" hole (seebibliography) which would enable a cracker to bootstrap a "root" shell.This could be used to delete your filestore, create a new account, copyyour password file, anything.(Contrary to popular opinion, crack attacks via sendmail were not justrestricted to the infamous "Internet Worm" - any cracker could do thisby using "telnet" to port 25 on the target machine.  The story behind asimilar hole (this time in EMACS) is described in [Stoll].)New holes like this appear all the time, and your best hopes are to:  a: try to structure your system so that as little software as possible  runs with root/daemon/bin privileges, and that which does is known to  be robust.  b: subscribe to a mailing list which can get details of problems  and/or fixes out to you as quickly as possible, and then ACT when you  receive information.3) Incompatible Usage Security Holes- Where, through lack of experience, or no fault of his/her own, theSystem Manager assembles a combination of hardware and software whichwhen used as a system is seriously flawed from a security point of view.It is the incompatibility of trying to do two unconnected but usefulthings which creates the security hole.Problems like this are a pain to find once a system is set up andrunning, so it is better to build your system with them in mind.  It'snever too late to have a rethink, though.Some examples are detailed below; let's not go into them here, it wouldonly spoil the surprise.4) Choosing a suitable security philosophy and maintaining it.>From: Gene Spafford <spaf@cs.purdue.edu>>The fourth kind of security problem is one of perception and>understanding.  Perfect software, protected hardware, and compatible>components don't work unless you have selected an appropriate security>policy and turned on the parts of your system that enforce it.  Having>the best password mechanism in the world is worthless if your users>think that their login name backwards is a good password! Security is>relative to a policy (or set of policies) and the operation of a system>in conformance with that policy.Q.5 What tools are there to aid security?1) "COPS"Managed by Dan Farmer, this is a long established suite of shell scriptswhich forms an extensive security testing system; There is a rudimentarypassword cracker, and routines to check the filestore for suspiciouschanges in setuid programs, others to check permissions of essentialsystem and user files, and still more to see whether any system softwarebehaves in a way which could cause problems.The software comes in two versions - one written in Perl and one(largely equivalent) written in shell scripts.  The latest version isvery up-to-date on Unix Security holes.2) "Crack" (+ "UFC").Written by Alec Muffett, this is a program written with one purpose in

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
首页综合国产亚洲丝袜| 91成人在线观看喷潮| 99在线精品观看| 日韩视频永久免费| 亚洲男人电影天堂| 国产成人综合自拍| 51精品秘密在线观看| 国产精品动漫网站| 国模一区二区三区白浆| 欧美日韩精品欧美日韩精品一| 久久久精品日韩欧美| 日韩精品福利网| 91黄色小视频| 日韩码欧中文字| 成人毛片在线观看| 欧美精品一区二区三区在线| 日韩电影在线观看网站| 在线观看一区二区精品视频| 国产精品色噜噜| 国产大陆a不卡| 久久精品人人做人人综合| 亚洲成人在线免费| 欧美日韩日日骚| 亚洲一区二区中文在线| 色综合中文字幕| 亚洲男人天堂一区| 色综合久久久久| 一区二区三区欧美亚洲| 91美女福利视频| 综合久久给合久久狠狠狠97色| 国产一区二区三区四区五区美女 | 日韩小视频在线观看专区| 一区二区三区欧美日| 91丝袜呻吟高潮美腿白嫩在线观看| 久久久久久久久久久久久久久99| 激情欧美一区二区三区在线观看| 日韩一区二区电影在线| 久久精品国产色蜜蜜麻豆| 日韩美女在线视频| 激情欧美日韩一区二区| 久久久久免费观看| 国产成人超碰人人澡人人澡| 国产欧美一区二区精品性| 国产精品99久久久| 中文字幕中文字幕一区二区| 91热门视频在线观看| 亚洲靠逼com| 欧美伊人精品成人久久综合97| 亚洲综合色丁香婷婷六月图片| 欧美性猛交一区二区三区精品| 亚洲超碰精品一区二区| 欧美一区二区三区在线视频| 久久精品国产一区二区三 | 欧美日韩视频不卡| 日本vs亚洲vs韩国一区三区| 精品久久久久久久久久久久久久久久久 | 国产成人午夜精品影院观看视频| 欧美激情综合在线| 色哦色哦哦色天天综合| 日韩中文字幕91| 国产欧美精品一区二区三区四区 | 国模少妇一区二区三区| 国产精品久久久久婷婷| 色婷婷精品大在线视频| 五月天亚洲精品| 久久久高清一区二区三区| av不卡免费电影| 日本欧美加勒比视频| 国产亚洲欧美一级| 欧美日韩国产综合视频在线观看| 国产一区福利在线| 亚洲在线免费播放| 2020国产精品自拍| 精品视频一区三区九区| 国产激情视频一区二区三区欧美| 亚洲色欲色欲www| 日韩欧美激情四射| 色94色欧美sute亚洲线路一ni| 久久国产精品第一页| 18欧美乱大交hd1984| 欧美成人女星排名| 91福利在线免费观看| 精品一区二区精品| 亚洲一区二区视频| 中文字幕欧美日本乱码一线二线| 精品污污网站免费看| 成人网在线播放| 久久99精品久久久久久动态图| 亚洲视频你懂的| 久久综合av免费| 欧美一级二级在线观看| 欧美最新大片在线看| 成人综合在线观看| 狠狠久久亚洲欧美| 日韩avvvv在线播放| 亚洲综合视频网| 国产精品女同一区二区三区| 日韩欧美国产1| 911精品国产一区二区在线| 色婷婷综合中文久久一本| 国产精品中文欧美| 捆绑变态av一区二区三区| 婷婷激情综合网| 香蕉久久一区二区不卡无毒影院| 亚洲人成网站在线| 综合久久久久久久| 亚洲人成网站精品片在线观看| 欧美激情一区二区三区不卡| 精品对白一区国产伦| 2020国产精品| 日韩毛片高清在线播放| 欧美极品少妇xxxxⅹ高跟鞋| 国产亚洲精品久| 久久精品人人爽人人爽| 久久久www成人免费无遮挡大片| 精品乱码亚洲一区二区不卡| 欧美变态tickling挠脚心| 欧美一区二区三区电影| 欧美一区欧美二区| 欧美高清视频不卡网| 在线不卡免费av| 日韩欧美综合在线| 欧美本精品男人aⅴ天堂| 久久久久国产一区二区三区四区| 久久久久久久久免费| 国产视频在线观看一区二区三区| 欧美国产激情二区三区| 国产精品欧美久久久久无广告| 中文字幕永久在线不卡| ...av二区三区久久精品| 亚洲激情综合网| 午夜精品久久久久久久久久久| 五月婷婷久久综合| 精品一区二区免费视频| 丁香六月久久综合狠狠色| 色94色欧美sute亚洲线路一ni| 欧美色图激情小说| 欧美成va人片在线观看| 国产精品五月天| 一个色在线综合| 美女一区二区视频| 国产成人在线网站| 91精品福利视频| 日韩你懂的在线观看| 欧美国产精品专区| 亚洲午夜激情av| 国产精品资源网| 欧美午夜一区二区三区| 91精品国产91久久久久久最新毛片 | 日韩在线一二三区| 国产精品中文字幕一区二区三区| 99综合电影在线视频| 欧美精品自拍偷拍| 亚洲国产精品成人久久综合一区 | 老司机免费视频一区二区| 成人激情电影免费在线观看| 欧美视频一区二区| 久久婷婷色综合| 亚洲精品成a人| 国产精华液一区二区三区| 色欧美88888久久久久久影院| 日韩一区二区三区电影在线观看| 国产亚洲人成网站| 三级精品在线观看| 91亚洲精品一区二区乱码| 欧美一区二区在线观看| 1024亚洲合集| 国产在线观看免费一区| 99久久综合国产精品| 性久久久久久久| 日韩一级欧美一级| 精品欧美一区二区久久| 天天综合天天综合色| 欧美一区二区三区爱爱| 一区二区三区在线观看欧美| 国产精品私人自拍| 天天综合日日夜夜精品| 色哟哟在线观看一区二区三区| 日韩亚洲国产中文字幕欧美| 夜夜嗨av一区二区三区中文字幕| 午夜电影久久久| 99视频热这里只有精品免费| 久久先锋影音av| 午夜久久久影院| 91久久精品一区二区三| 7777精品伊人久久久大香线蕉超级流畅| 国产精品欧美一区二区三区| 国产精品香蕉一区二区三区| 欧美精品成人一区二区三区四区| 中文字幕一区二区在线观看| 久久精品噜噜噜成人av农村| 欧美精品tushy高清| 亚洲h在线观看| av成人免费在线| 中文字幕制服丝袜一区二区三区 | 亚洲综合激情另类小说区| 不卡的av电影在线观看| 中文字幕不卡的av| 国产精品66部| 亚洲国产高清在线观看视频|