亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? almost everything you ever wanted to know about security (but.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
        Almost Everything You Ever Wanted To Know About Security*                       *(but were afraid to ask!)This document is meant to answer some of the questions which regularlyappear in the Usenet newsgroups "comp.security.misc" and "alt.security",and is meant to provide some background to the subject for newcomers tothat newsgroup.This FAQ is maintained by Alec Muffett (aem@aber.ac.uk, uknet!aber!aem),with contributions from numerous others [perhaps].  The views expressedin the document are the personal views of the author(s), and it shouldnot be inferred that they are necessarily shared by anyone with whom theauthor(s) are now, or ever may be, associated.Many thanks go to (in no particular order): Steve Bellovin, Matt Bishop,Mark Brader, Ed DeHart, Dave Hayes, Jeffrey Hutzelman, William LeFebvre,Wes Morgan, Rob Quinn, Chip Rosenthal, Wietse Venema, Gene Spafford,John Wack and Randall Atkinson.Disclaimer: Every attempt is made to ensure that the informationcontained in this FAQ is up to date and accurate, but no responsibilitywill be accepted for actions resulting from information gained herein.Questions which this document addresses:Q.1 What are alt.security and comp.security.misc for?Q.2 Whats the difference between a hacker and a cracker?Q.3 What is "security through obscurity"Q.4 What makes a system insecure?Q.5 What tools are there to aid security?Q.6 Isn't it dangerous to give cracking tools to everyone?Q.7 Where can I get these tools?Q.8 Why and how do systems get broken into?Q.9 Who can I contact if I get broken into?Q.10 What is a firewall?Q.11 Why shouldn't I use setuid shell scripts?Q.12 Why shouldn't I leave "root" permanently logged on the console?Q.13 Why shouldn't I create Unix accounts with null passwords?Q.14 What security holes are associated with X-windows (and other WMs)?Q.15 What security holes are associated with NFS?Q.16 How can I generate safe passwords?Q.17 Why are passwords so important?Q.18 How many possible passwords are there?Q.19 Where can I get more information?Q.20 How silly can people get?---------------------------------------------------------------------------Q.1 What are alt.security and comp.security.misc for?Comp.security.misc is a forum for the discussion of computer security,especially those relating to Unix (and Unix like) operating systems.Alt.security used to be the main newsgroup covering this topic, as wellas other issues such as car locks and alarm systems, but with thecreation of comp.security.misc, this may change.This FAQ will concentrate wholly upon computer related security issues.The discussions posted range from the likes of "What's such-and-suchsystem like?" and "What is the best software I can use to do so-and-so"to "How shall we fix this particular bug?", although there is often alow signal to noise ratio in the newsgroup (a problem which this FAQhopes to address).The most common flamewars start when an apparent security novice posts amessage saying "Can someone explain how the such-and-such security holeworks?" and s/he is immediately leapt upon by a group of self appointedpeople who crucify the person for asking such an "unsound" question in apublic place, and flame him/her for "obviously" being a cr/hacker.Please remember that grilling someone over a high flame on the groundsthat they are "a possible cr/hacker" does nothing more than generate alot of bad feeling.  If computer security issues are to be dealt with inan effective manner, the campaigns must be brought (to a large extent)into the open.Implementing computer security can turn ordinary people into rampagingparanoiacs, unable to act reasonably when faced with a new situation.Such people take an adversarial attitude to the rest of the human race,and if someone like this is in charge of a system, users will rapidlyfind their machine becoming more restrictive and less friendly (fun?) touse.This can lead to embarrasing situations, eg: (in one university) banninga head of department from the college mainframe for using a networkutility that he wasn't expected to.  This apparently required a lot ofexplaining to an unsympathetic committee to get sorted out.A more sensible approach is to secure a system according to its needs,and if its needs are great enough, isolate it completely.  Please, don'tlose your sanity to the cause of computer security; it's not worth it.Q.2 What's the difference between a hacker and a cracker?Lets get this question out of the way right now:On USENET, calling someone a "cracker" is an unambiguous statement thatsome person persistently gets his/her kicks from breaking from intoother peoples computer systems, for a variety of reasons.  S/He may posesome weak justification for doing this, usually along the lines of"because it's possible", but most probably does it for the "buzz" ofdoing something which is illicit/illegal, and to gain status amongst apeer group.Particularly antisocial crackers have a vandalistic streak, and deletefilestores, crash machines, and trash running processes in pursuit oftheir "kicks".The term is also widely used to describe a person who breaks copyprotection software in microcomputer applications software in order tokeep or distribute free copies.On USENET, calling someone a "hacker" is usually a statement that saidperson holds a great deal of knowledge and expertise in the field ofcomputing, and is someone who is capable of exercising this expertisewith great finesse.  For a more detailed definition, readers arereferred to the Jargon File [Raymond].In the "real world", various media people have taken the word "hacker"and coerced it into meaning the same as "cracker" - this usageoccasionally appears on USENET, with disastrous and confusing results.Posters to the security newsgroups should note that they currently riska great deal of flamage if they use the word "hacker" in place of"cracker" in their articles.NB: nowhere in the above do I say that crackers cannot be true hackers.It's just that I don't say that they are...Q.3 What is "security through obscurity"Security Through Obscurity (STO) is the belief that a system of any sortcan be secure so long as nobody outside of its implementation group isallowed to find out anything about its internal mechanisms.  Hidingaccount passwords in binary files or scripts with the presumption that"nobody will ever find it" is a prime case of STO.STO is a philosophy favoured by many bureaucratic agencies (military,governmental, and industrial), and it used to be a major method ofproviding "pseudosecurity" in computing systems.Its usefulness has declined in the computing world with the rise of opensystems, networking, greater understanding of programming techniques, aswell as the increase in computing power available to the average person.The basis of STO has always been to run your system on a "need to know"basis.  If a person doesn't know how to do something which could impactsystem security, then s/he isn't dangerous.Admittedly, this is sound in theory, but it can tie you into trusting asmall group of people for as long as they live.  If your employees getan offer of better pay from somewhere else, the knowledge goes withthem, whether the knowledge is replaceable or not.  Once the secret getsout, that is the end of your security.Nowadays there is also a greater need for the ordinary user to knowdetails of how your system works than ever before, and STO falls down aas a result.  Many users today have advanced knowledge of how theiroperating system works, and because of their experience will be able toguess at the bits of knowledge that they didn't "need to know".  Thisbypasses the whole basis of STO, and makes your security useless.Hence there is now a need is to to create systems which attempt to bealgorithmically secure (Kerberos, Secure RPC), rather than justphilosophically secure.  So long as your starting criteria can be met,your system is LOGICALLY secure."Shadow Passwords" (below) are sometimes dismissed as STO, but this isincorrect, since (strictly) STO depends on restricting access to analgorithm or technique, whereas shadow passwords provide security byrestricting access to vital data.Q.4 What makes a system insecure?Switching it on.  The adage usually quoted runs along these lines: "The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards.  Even then, I wouldn't stake my life on it."(the original version of this is attributed to Gene Spafford)A system is only as secure as the people who can get at it.  It can be"totally" secure without any protection at all, so long as its continuedgood operation is important to everyone who can get at it, assuming allthose people are responsible, and regular backups are made in case ofhardware problems.  Many laboratory PC's quite merrily tick away thehours like this.The problems arise when a need (such as confidentiality) has to befulfilled.  Once you start putting the locks on a system, it is fairlylikely that you will never stop.Security holes manifest themselves in (broadly) four ways:1) Physical Security Holes.- Where the potential problem is caused by giving unauthorised personsphysical access to the machine, where this might allow them to performthings that they shouldn't be able to do.A good example of this would be a public workstation room where it wouldbe trivial for a user to reboot a machine into single-user mode and muckaround with the workstation filestore, if precautions are not taken.Another example of this is the need to restrict access to confidentialbackup tapes, which may (otherwise) be read by any user with access tothe tapes and a tape drive, whether they are meant to have permission ornot.2) Software Security Holes- Where the problem is caused by badly written items of "privledged"software (daemons, cronjobs) which can be compromised into doing thingswhich they shouldn't oughta.The most famous example of this is the "sendmail debug" hole (seebibliography) which would enable a cracker to bootstrap a "root" shell.This could be used to delete your filestore, create a new account, copyyour password file, anything.(Contrary to popular opinion, crack attacks via sendmail were not justrestricted to the infamous "Internet Worm" - any cracker could do thisby using "telnet" to port 25 on the target machine.  The story behind asimilar hole (this time in EMACS) is described in [Stoll].)New holes like this appear all the time, and your best hopes are to:  a: try to structure your system so that as little software as possible  runs with root/daemon/bin privileges, and that which does is known to  be robust.  b: subscribe to a mailing list which can get details of problems  and/or fixes out to you as quickly as possible, and then ACT when you  receive information.3) Incompatible Usage Security Holes- Where, through lack of experience, or no fault of his/her own, theSystem Manager assembles a combination of hardware and software whichwhen used as a system is seriously flawed from a security point of view.It is the incompatibility of trying to do two unconnected but usefulthings which creates the security hole.Problems like this are a pain to find once a system is set up andrunning, so it is better to build your system with them in mind.  It'snever too late to have a rethink, though.Some examples are detailed below; let's not go into them here, it wouldonly spoil the surprise.4) Choosing a suitable security philosophy and maintaining it.>From: Gene Spafford <spaf@cs.purdue.edu>>The fourth kind of security problem is one of perception and>understanding.  Perfect software, protected hardware, and compatible>components don't work unless you have selected an appropriate security>policy and turned on the parts of your system that enforce it.  Having>the best password mechanism in the world is worthless if your users>think that their login name backwards is a good password! Security is>relative to a policy (or set of policies) and the operation of a system>in conformance with that policy.Q.5 What tools are there to aid security?1) "COPS"Managed by Dan Farmer, this is a long established suite of shell scriptswhich forms an extensive security testing system; There is a rudimentarypassword cracker, and routines to check the filestore for suspiciouschanges in setuid programs, others to check permissions of essentialsystem and user files, and still more to see whether any system softwarebehaves in a way which could cause problems.The software comes in two versions - one written in Perl and one(largely equivalent) written in shell scripts.  The latest version isvery up-to-date on Unix Security holes.2) "Crack" (+ "UFC").Written by Alec Muffett, this is a program written with one purpose in

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91视视频在线直接观看在线看网页在线看| 久久国产精品区| 亚洲主播在线观看| 国产九色精品成人porny| 在线视频综合导航| 国产欧美日韩精品在线| 蜜桃精品视频在线| 欧洲一区二区av| 中文字幕一区二区日韩精品绯色| 免费观看日韩av| 欧美亚洲一区二区三区四区| 国产精品久久综合| 国模一区二区三区白浆| 欧美日韩国产高清一区二区| 国产精品不卡在线| 国产精品1区2区| 欧美日韩精品欧美日韩精品一 | 国内精品伊人久久久久av影院 | 国产精品人成在线观看免费 | 五月婷婷欧美视频| 波多野结衣中文字幕一区二区三区 | 欧美大片在线观看| 亚洲国产精品久久一线不卡| 色悠悠久久综合| 自拍偷拍欧美激情| www.成人网.com| 国产欧美一区二区在线观看| 国产乱码一区二区三区| 精品理论电影在线观看| 久久精品免费观看| 日韩一区二区免费在线观看| 亚洲一区二区三区四区在线观看 | 一个色综合av| 欧美影院精品一区| 亚洲狠狠爱一区二区三区| 在线观看成人免费视频| 亚洲高清视频中文字幕| 91麻豆精品国产91久久久久久久久| 亚洲成a人片在线观看中文| 色吧成人激情小说| 一区二区三区在线观看国产| 91久久国产综合久久| 一区二区三区欧美日韩| 欧美性videosxxxxx| 亚洲成人综合网站| 日韩美女在线视频| 国产盗摄女厕一区二区三区| 国产精品久久久久久久久果冻传媒 | 亚洲四区在线观看| 91成人免费网站| 日本午夜一区二区| 精品1区2区在线观看| 国产成人精品aa毛片| 国内久久精品视频| 欧美日韩精品欧美日韩精品一综合| 亚洲电影在线免费观看| 91精品麻豆日日躁夜夜躁| 韩国欧美一区二区| 国产精品少妇自拍| 色狠狠综合天天综合综合| 亚洲成a人片在线观看中文| 欧美一区二区三区免费| 看片网站欧美日韩| 国产精品热久久久久夜色精品三区| 一本色道**综合亚洲精品蜜桃冫| 天天色天天操综合| 国产亚洲短视频| 欧美系列在线观看| 国产一区二区三区不卡在线观看| 亚洲欧美另类久久久精品2019| 欧美久久久久久蜜桃| 精东粉嫩av免费一区二区三区| 中文字幕乱码亚洲精品一区 | 欧美日本在线播放| 国产宾馆实践打屁股91| 亚洲成人tv网| 国产亚洲一区二区三区四区 | 亚洲国产一区二区视频| 久久精品视频免费| 欧美亚洲国产一区二区三区va | 中文字幕在线免费不卡| 欧美一区二区三区白人| 91片在线免费观看| 久久黄色级2电影| 一区二区三区四区亚洲| 精品国产乱码91久久久久久网站| 99久久久精品| 国产精品一区二区不卡| 日本系列欧美系列| 亚洲一区自拍偷拍| 欧美国产1区2区| 日韩三级伦理片妻子的秘密按摩| 色婷婷精品大在线视频 | 欧美伊人久久大香线蕉综合69| 国产成人精品一区二区三区网站观看| 婷婷成人激情在线网| 亚洲日本在线a| 中文字幕成人在线观看| 精品日韩成人av| 在线综合视频播放| 欧美人妖巨大在线| 欧美视频精品在线| 91久久线看在观草草青青| 99在线精品观看| 成人精品小蝌蚪| 国产91精品精华液一区二区三区 | 国产亚洲精品bt天堂精选| 欧美一级片免费看| 欧美中文字幕一区二区三区| 91在线视频免费91| 成人晚上爱看视频| 顶级嫩模精品视频在线看| 国产一区二区日韩精品| 国产在线观看一区二区| 国产一区二区在线看| 极品少妇一区二区| 国产在线精品免费| 国产精华液一区二区三区| 国产自产v一区二区三区c| 国产资源精品在线观看| 国产成人精品免费在线| 国产成人精品一区二区三区四区 | 国产欧美日本一区视频| 中国av一区二区三区| 国产午夜亚洲精品午夜鲁丝片| 国产喂奶挤奶一区二区三区| 久久久国际精品| 国产精品亲子乱子伦xxxx裸| 日韩伦理av电影| 一区二区三区不卡在线观看| 婷婷综合五月天| 六月丁香婷婷色狠狠久久| 国产裸体歌舞团一区二区| 成人综合激情网| 91麻豆国产福利精品| 欧美日韩日本视频| 日韩一卡二卡三卡国产欧美| 久久先锋影音av鲁色资源网| 亚洲国产精品成人综合色在线婷婷| 中文字幕在线一区免费| 性感美女极品91精品| 久久精品国产免费| 91丝袜美女网| 5566中文字幕一区二区电影| 久久久久久久久99精品| 亚洲欧美激情小说另类| 日本美女一区二区三区| 成人国产精品免费网站| 欧美午夜影院一区| 精品免费国产一区二区三区四区| 中文字幕免费在线观看视频一区| 亚洲高清免费观看高清完整版在线观看| 日本亚洲一区二区| 懂色av一区二区夜夜嗨| 欧美妇女性影城| 中文字幕免费观看一区| 奇米色777欧美一区二区| www.亚洲免费av| 欧美精品 日韩| 成人免费在线视频观看| 毛片一区二区三区| 在线免费观看成人短视频| 久久综合久久99| 亚洲二区视频在线| 99热精品国产| 欧美白人最猛性xxxxx69交| 亚洲最新在线观看| 国产成人一区二区精品非洲| 91麻豆精品国产91久久久| 国产精品家庭影院| 久久99精品国产麻豆婷婷 | 亚洲一区二区三区不卡国产欧美| 精品亚洲成a人| 欧美久久久久久久久久| 日韩一区在线免费观看| 国产精品一区二区男女羞羞无遮挡| 欧美日韩精品电影| 亚洲精品免费在线播放| 国产精品性做久久久久久| 日韩午夜在线观看| 午夜精品在线看| 日本乱码高清不卡字幕| 国产精品青草久久| 国产69精品久久99不卡| 欧美成人性战久久| 奇米影视在线99精品| 欧美日韩免费视频| 一区二区三区国产豹纹内裤在线 | 亚洲欧美一区二区久久| 成人丝袜高跟foot| 欧美国产一区二区在线观看| 国产在线精品一区在线观看麻豆| 日韩一二三区不卡| 日本最新不卡在线| 欧美一区二区不卡视频| 日精品一区二区三区| 欧美一级欧美三级在线观看| 五月激情综合色| 777xxx欧美| 美女尤物国产一区|