亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cops and robbers-unix system security.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
     Enhancements I envision include:i) Improved speed and portability without sacrificing  func-tionality (pretty obvious, I guess....)ii) A level of severity assigned to each  warning;  anythingthat  could  compromise root instantly (root having no pass-word, for example) might have a level 0 priority, while sim-ply  having a user with a writable home directory might only                     February 19, 1991                           - 11 -be level 3.  This way the system could be run at  a  certainthreshold  level, or simply have the set of warnings priori-tized for a less sophisticated administrator.iii) Better handling of SUID programs.  The current  programneeds  more  work  to be done on it to be run effectively bymost people; many will not be willing to put the time neededto  go  through  the list of SUID files by hand to decide ifthey are needed or not.  Perhaps also an alarm  would  soundif a shell script is SUID; doubly so if root owned.iv) A CRC checker that would check a file  system  (possiblyjust  the  most  important  programs  (such as this :-)) andreport if any of the executable files were changed -- possi-bly signalling a viral infection.v) The eradication of any design flaws or coding errors thatare in the COPS system.     The main purpose of creating the COPS system  was  two-fold;  the first was to foster an understanding of the secu-rity problems common to most UNIX systems,  and  the  secondwas  to  try  to  create and apply software tools that, whenrun, will inform system administrators of potential problemspresent in their system.  No attempt is made by the tools tocorrect any problems because a potential security problem atone  site  may  be  standard policy/practice at another.  Anemphasis on furthering education and knowledge about UNIX ingeneral is the key to good security practices, not followingblindly what an unintelligent tool might say.     Some of the advantages to using a system such  as  COPSare:i)  Nearly  Continuous  monitoring  of  traditional  problemareas.ii) A new system can be checked before being put  into  pro-duction.iii) New or inexperienced administrators can not  only  stopsome  of  their  problems in security they may have, but canalso raise their consciousness about the potential for secu-rity dilemmas.     And a couple of disadvantages:i) An administrator could get a false sense of security fromrunning  these  programs.  Caveat emptor (ok, they are free,but still beware.)ii) A specific path to the elimination of the problem is notpresented.   This  could  also be construed as an advantage,when considering the third point.                     February 19, 1991                           - 12 -iii) Badguys can get these tools.  You know -- the guys withblack hats.  What happens when they get a copy of this pack-age?  With any sensitive subject like security, knowledge iszealously   guarded.    People   are  afraid  that  absoluteknowledge corrupts -- who knows, they may be right.   But  Istaunchly  stand by the tree of knowledge.  Let the bad guystaste the fruit, and they may see the light,  so  to  speak.In  addition,  the  system  does  not say how to exploit thehole, just that it exists.     Results of Running COPS:     Not surprisingly, the results when COPS was run  variedsignificantly  depending  on what system and site it was runon.  Here at Purdue, it was run on a Sequent  Symmetry  run-ning DYNIX 3.0.12, on a pair of Suns (a 3/280 and 3/50) run-ning UNIX 4.2 release 3.4, a  VAX  11/780  running  4.3  BSDUNIX,  a  VAX  8600  running  Ultrix 2.2, and finally a NeXTmachine running their 0.9 O/S version of UNIX.  The  resultsof  the  COPS  system showed a reasonable amount of securityconcern on all of the machines; the  faculty  only  machinesshowed  the  weakest security, followed by the machines usedby the graduate  students,  and  finally  the  undergraduatemachines  had  the  strongest  security  (our administrators_know_ that  you  can't  trust  those  (us?)  young  folks.)Whether  this was showing that Purdue has a good administra-tion, or that the UNIX vendors have a fairly good  grasp  onpotential  security problems, or if it was merely showcasingthe shortcomings of this system wasn't clear to me from  theresults.     The security results probably will  vary  significantlyfrom  machine  to  machine  --  this is not a fault of UNIX;merely having the same machine and software  does  not  meanthat  two  sites will not have completely different securityconcerns.  In addition, different vendors and administratorshave  significantly varying opinions on how a machine shouldbe set up.  There is no fundamental reason  why  any  systemcannot  pass  all  or nearly all of these tests, but what isstandard policy at one sites may be an unthinkable  risk  atanother,  depending  upon the nature of the work being done,the information stored on the computer, and the users of thesystem.     When I first started researching this report, I thoughtit  would  be  a  fairly  easy  task.  Go to a few computingsites, read some theoretical papers, gather all the programseveryone  had written, and write a brief summary paper.  Butwhat I found was an tremendous  lack  of  communication  andconcerted  effort towards the subject of security.  AT&T hadwritten a couple of programs ([Kaplilow and Cherepov 88], ashad   Hewlett   Packard   ([Spence   89]),   but  they  wereproprietary.  I heard rumors that the government was  eitherworking on or had such a security system, but they certainly                     February 19, 1991                           - 13 -weren't going to give it to me.  The  one  book  devoted  toUNIX security ([Kochran and Wood 86]) was good, but the pro-grams that they presented were not expansive enough for whatI  had  in  mind,  plus the fact that they had written theirprograms mostly based on System V.  And  while  most  systemadministrators  I  talked  to  had  written at least a shellscript or two that performed a  minor  security  task  (SUIDprograms seemed the most popular), no one seemed to exchangeideas or any their problems with  other  sites  --  possiblyafraid  that the admission of a weakness in their site mightbe an invitation to disaster.  There is an  excellent  secu-rity  discussion  group on the network ([Various Authors 84-]), from which I received some excellent ideas for this pro-ject, but it is very restrictive to whom it allows to parti-cipate.  I hope that with the release of this security  sys-tem it will not only help stamp out problems with UNIX secu-rity, but would encourage people  to  exchange  ideas,  pro-grams,  problems  and solutions to the computer community atlarge.Dan Farmer September 29, 1989     Acknowledgements: I would like to thank Eugene Spaffordfor  his  invaluable  help in the researching, planning, anddevelopment of this project.  Without the writings and  pro-grams created by Robert Morris, Matt Bishop, and other capa-ble UNIX programmers, this project could never  have  gottenoff  the  ground.  Thanks also go to Brian Kernighan, DennisRitchie, Donald Knuth, and Ken Thompson, for  such  inspira-tional  computer  work.   And of course without Peg, none ofthis would have come into being.  Thanks  again  to  all  ofyou.                     February 19, 1991                           - 14 -                        BIBLIOGRAPHY_, UNIX Programmers Manual, 4.2 Berkeley Software  Distribu-tion,  Computer  Science  Division, Department of ElectricalEngineering and Computer Science University  of  California,Berkeley, CA, August 1983._, DYNIX(R) V3.0.12 System Manuals,  Sequent  Computer  Sys-tems, Inc., 1984.Aho, Alfred V., Brian W. Kernighan, and Peter J. Weinberger,The AWK Programming Language, Addison-Wesley Publishing Com-pany, 1988.Authors, Various, UNIX Security Mailing  List/Security  Dig-est, December 1984 -.Baldwin,  Robert  W.,  Crypt  Breakers  Workbench,   Usenet,October 1986.Baldwin, Robert W., Rule Based Analysis  of  Computer  Secu-rity, Massachusetts Institute of Technology, June 1987.Bauer, David S. and Michael E. Koblentz, NIDX - A  Real-TimeIntrusion Detection Expert System, Proceedings of the Summer1988 USENIX Conference, Summer, 1988.Bishop, Matt, Security Problems with the UNIX Operating Sys-tem,  Department  of  Computer  Sciences, Purdue University,January 31, 1983.Bishop, Matt, How to Write a Setuid Program, April 18, 1985.Denning, Dorothy, Cryptography and Data  Security,  Addison-Wesley Publishing Company, Inc, 1983.Duff, Tom, Viral Attacks On UNIX System  Security,  Proceed-ings of the Winter 1988 USENIX Conference, Winter, 1988.Fiedler, David and Bruce Hunter, UNIX System Administration,Hayden Book Company, 1986.Grampp, F. T. and R. H. Morris, "UNIX Operating System Secu-rity,"  AT&T  Bell  Laboratories  Technical Journal, October1984.Kaplilow, Sharon A. and Mikhail Cherepov, "Quest -- A  Secu-rity  Auditing Tool," AT&T Bell Laboratories Technical Jour-nal, AT&T  Bell  Laboratories  Technical  Journal,  May/June1988.Morris, Robert and Ken Thompson, "Password Security : A CaseHistory," Communications of the ACM, November 1979.                     February 19, 1991                           - 15 -Reed, Brian, "Reflections on Some Recent Widespread ComputerBreak-ins,"  Communications  of the ACM, vol. Vol 30, No. 2,February 1987.Reed, J.A. and P.J. Weinberger, File Security and  the  UNIXSystem  Crypt Command, Vol 63, No. 8, AT&T Bell LaboratoriesTechnical Journal, October 1984.Smith, Kirk, Tales of  the  Damned,  UNIX  Review,  February1988.Spafford, Eugene H., The Internet Worm Program: An Analysis,Purdue Technical Report CSD-TR-823, Nov 28, 1988.Spafford, Eugene H., 1989.  Private CommunicationsBruce Spence, spy: A  UNIX  File  System  Security  Monitor,Workshop  Proceedings  of  the  Large  Installation  SystemsAdministration III, September, 1988.Stoll, Clifford, Stalking the Wily Hacker, Volume 31, Number5, Communications of the ACM, May 1988.Thompson, Ken, Reflections on  Trusting  Trust,  Volume  27,Number 8, Communications of the ACM, August 1984.Wood, Patrick and Stephen  Kochran,  UNIX  System  Security,Hayden Books, 1986.Wood, Patrick, A Loss of Innocence,  UNIX  Review,  February1988.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成av人片一区二区三区| 成人一区在线看| 免费在线一区观看| a级高清视频欧美日韩| 日韩三区在线观看| 亚洲影院在线观看| 成人精品视频一区二区三区尤物| 欧美福利一区二区| 一区二区三区四区高清精品免费观看 | 日韩欧美国产精品一区| 亚洲男人的天堂在线aⅴ视频| 在线欧美日韩精品| 久久日韩粉嫩一区二区三区| 日韩中文字幕av电影| 91成人看片片| 亚洲九九爱视频| 99麻豆久久久国产精品免费 | 国产成人av福利| 欧美日韩国产成人在线91| 国产精品家庭影院| 国产成人亚洲综合色影视| 欧美成人国产一区二区| 强制捆绑调教一区二区| 欧美不卡视频一区| 日韩vs国产vs欧美| 欧美精品xxxxbbbb| 午夜亚洲福利老司机| 欧美乱妇一区二区三区不卡视频| 亚洲卡通动漫在线| 在线看日本不卡| 亚洲第一在线综合网站| 欧美日韩一区小说| 亚洲国产视频一区| 欧美午夜宅男影院| 亚洲成a人在线观看| 在线不卡欧美精品一区二区三区| 午夜精品在线视频一区| 欧美激情一区在线观看| 国产精品一区二区久激情瑜伽 | 一区二区三区美女| 在线观看成人小视频| 亚洲影视在线播放| 欧美伦理电影网| 肉色丝袜一区二区| 欧美日韩国产高清一区二区三区| 亚洲成人免费观看| 日韩一区二区免费在线观看| 精品一二线国产| 国产精品全国免费观看高清| 欧美一区二区三区在线视频 | 国产麻豆精品95视频| 中文字幕不卡在线播放| 91首页免费视频| 日韩高清不卡在线| 国产婷婷精品av在线| 日本道精品一区二区三区| 亚洲成人动漫av| 久久精品视频免费| 91国在线观看| 美腿丝袜亚洲色图| 国产精品不卡一区| 欧美高清视频在线高清观看mv色露露十八| 久久精品噜噜噜成人88aⅴ| 欧美激情综合在线| 91成人看片片| 极品美女销魂一区二区三区| 国产精品电影一区二区| 欧美日韩高清一区二区不卡| 国产精品影视在线| 午夜视频久久久久久| 国产精品午夜免费| 国产精品视频一二| 欧美自拍偷拍一区| 国产一区二区三区综合| 香蕉影视欧美成人| 国产精品国产馆在线真实露脸| 欧美日韩国产乱码电影| 不卡av免费在线观看| 男人的天堂久久精品| 一区二区在线观看av| 精品精品国产高清一毛片一天堂| 在线中文字幕一区二区| 国产成人午夜视频| 日韩电影免费在线看| 亚洲视频免费观看| 久久久久青草大香线综合精品| 精品视频在线免费观看| 欧美日韩视频专区在线播放| 国产精华液一区二区三区| 天天亚洲美女在线视频| 亚洲欧美日韩久久| 日本一区二区三区免费乱视频 | 欧美日韩一区二区三区视频| 成人激情开心网| 激情丁香综合五月| 免费日韩伦理电影| 亚洲成人动漫av| 亚洲综合免费观看高清完整版 | 亚洲天堂免费看| 伊人色综合久久天天| 欧美成人一级视频| 欧美日韩国产在线播放网站| 色综合天天综合| 不卡视频免费播放| 夫妻av一区二区| 国产91富婆露脸刺激对白| 久久精品国产精品亚洲精品| 日韩av网站在线观看| 亚洲国产日韩精品| 五月天激情小说综合| 亚洲欧美日韩系列| 一区二区三区鲁丝不卡| 亚洲精品视频免费观看| 一区视频在线播放| 一区在线中文字幕| 亚洲欧美国产高清| 极品少妇xxxx偷拍精品少妇| 日本不卡视频一二三区| 日韩中文字幕1| 欧美aaa在线| 国内精品在线播放| 狠狠狠色丁香婷婷综合激情 | 国产三级一区二区| 国产日韩综合av| 日韩一区在线播放| 一区二区三区四区av| 亚洲风情在线资源站| 奇米四色…亚洲| 国产精品夜夜爽| 不卡高清视频专区| 欧美亚一区二区| 国产精品超碰97尤物18| 亚洲欧美在线观看| 一区二区成人在线观看| 日韩专区一卡二卡| 蜜臀精品久久久久久蜜臀| 国精产品一区一区三区mba桃花| 国产精品123区| 色综合色综合色综合| 欧美高清hd18日本| 久久久久亚洲蜜桃| 亚洲女子a中天字幕| 奇米色一区二区三区四区| 蜜臀久久久久久久| 国产91精品免费| 欧洲精品在线观看| 精品国产凹凸成av人导航| 国产精品天干天干在线综合| 亚洲成人动漫在线观看| 欧美在线观看视频在线| 欧美一区在线视频| 中文字幕制服丝袜成人av| 五月激情丁香一区二区三区| 狠狠色伊人亚洲综合成人| 色综合久久88色综合天天6| 日韩视频在线观看一区二区| 国产精品久久久久影院亚瑟 | 亚洲成人综合在线| 韩国欧美国产1区| 欧美在线观看18| 国产三级三级三级精品8ⅰ区| 亚洲一区二区三区小说| 国产成人自拍在线| 欧美精品成人一区二区三区四区| 国产精品久久福利| www.综合网.com| 欧美精品一区男女天堂| 亚洲自拍偷拍av| 成人毛片老司机大片| 日韩欧美国产三级| 午夜a成v人精品| 色悠悠久久综合| 欧美国产一区视频在线观看| 日韩激情一二三区| 日本精品裸体写真集在线观看| 精品噜噜噜噜久久久久久久久试看| 亚洲日本欧美天堂| 成人毛片老司机大片| 久久人人97超碰com| 日本成人中文字幕在线视频| 欧美亚洲国产一区二区三区va| 国产精品白丝在线| 国产精品一区不卡| 精品少妇一区二区| 懂色av一区二区夜夜嗨| 欧美精品一区二区久久久| 婷婷中文字幕综合| 欧美性猛片aaaaaaa做受| 亚洲日韩欧美一区二区在线| 福利一区在线观看| 精品久久久网站| 美女一区二区三区在线观看| 在线不卡免费av| 丝袜国产日韩另类美女| 欧美性一级生活| 亚洲福利视频导航| 欧美日韩不卡一区| 亚洲成精国产精品女| 欧美精品777| 久久精品久久精品|