亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? almost everything you ever wanted to know about security (but.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
        Almost Everything You Ever Wanted To Know About Security*                       *(but were afraid to ask!)This document is meant to answer some of the questions which regularlyappear in the Usenet newsgroups "comp.security.misc" and "alt.security",and is meant to provide some background to the subject for newcomers tothat newsgroup.This FAQ is maintained by Alec Muffett (aem@aber.ac.uk, uknet!aber!aem),with contributions from numerous others [perhaps].  The views expressedin the document are the personal views of the author(s), and it shouldnot be inferred that they are necessarily shared by anyone with whom theauthor(s) are now, or ever may be, associated.Many thanks go to (in no particular order): Steve Bellovin, Matt Bishop,Mark Brader, Ed DeHart, Dave Hayes, Jeffrey Hutzelman, William LeFebvre,Wes Morgan, Rob Quinn, Chip Rosenthal, Wietse Venema, Gene Spafford,John Wack and Randall Atkinson.Disclaimer: Every attempt is made to ensure that the informationcontained in this FAQ is up to date and accurate, but no responsibilitywill be accepted for actions resulting from information gained herein.Questions which this document addresses:Q.1 What are alt.security and comp.security.misc for?Q.2 Whats the difference between a hacker and a cracker?Q.3 What is "security through obscurity"Q.4 What makes a system insecure?Q.5 What tools are there to aid security?Q.6 Isn't it dangerous to give cracking tools to everyone?Q.7 Where can I get these tools?Q.8 Why and how do systems get broken into?Q.9 Who can I contact if I get broken into?Q.10 What is a firewall?Q.11 Why shouldn't I use setuid shell scripts?Q.12 Why shouldn't I leave "root" permanently logged on the console?Q.13 Why shouldn't I create Unix accounts with null passwords?Q.14 What security holes are associated with X-windows (and other WMs)?Q.15 What security holes are associated with NFS?Q.16 How can I generate safe passwords?Q.17 Why are passwords so important?Q.18 How many possible passwords are there?Q.19 Where can I get more information?Q.20 How silly can people get?---------------------------------------------------------------------------Q.1 What are alt.security and comp.security.misc for?Comp.security.misc is a forum for the discussion of computer security,especially those relating to Unix (and Unix like) operating systems.Alt.security used to be the main newsgroup covering this topic, as wellas other issues such as car locks and alarm systems, but with thecreation of comp.security.misc, this may change.This FAQ will concentrate wholly upon computer related security issues.The discussions posted range from the likes of "What's such-and-suchsystem like?" and "What is the best software I can use to do so-and-so"to "How shall we fix this particular bug?", although there is often alow signal to noise ratio in the newsgroup (a problem which this FAQhopes to address).The most common flamewars start when an apparent security novice posts amessage saying "Can someone explain how the such-and-such security holeworks?" and s/he is immediately leapt upon by a group of self appointedpeople who crucify the person for asking such an "unsound" question in apublic place, and flame him/her for "obviously" being a cr/hacker.Please remember that grilling someone over a high flame on the groundsthat they are "a possible cr/hacker" does nothing more than generate alot of bad feeling.  If computer security issues are to be dealt with inan effective manner, the campaigns must be brought (to a large extent)into the open.Implementing computer security can turn ordinary people into rampagingparanoiacs, unable to act reasonably when faced with a new situation.Such people take an adversarial attitude to the rest of the human race,and if someone like this is in charge of a system, users will rapidlyfind their machine becoming more restrictive and less friendly (fun?) touse.This can lead to embarrasing situations, eg: (in one university) banninga head of department from the college mainframe for using a networkutility that he wasn't expected to.  This apparently required a lot ofexplaining to an unsympathetic committee to get sorted out.A more sensible approach is to secure a system according to its needs,and if its needs are great enough, isolate it completely.  Please, don'tlose your sanity to the cause of computer security; it's not worth it.Q.2 What's the difference between a hacker and a cracker?Lets get this question out of the way right now:On USENET, calling someone a "cracker" is an unambiguous statement thatsome person persistently gets his/her kicks from breaking from intoother peoples computer systems, for a variety of reasons.  S/He may posesome weak justification for doing this, usually along the lines of"because it's possible", but most probably does it for the "buzz" ofdoing something which is illicit/illegal, and to gain status amongst apeer group.Particularly antisocial crackers have a vandalistic streak, and deletefilestores, crash machines, and trash running processes in pursuit oftheir "kicks".The term is also widely used to describe a person who breaks copyprotection software in microcomputer applications software in order tokeep or distribute free copies.On USENET, calling someone a "hacker" is usually a statement that saidperson holds a great deal of knowledge and expertise in the field ofcomputing, and is someone who is capable of exercising this expertisewith great finesse.  For a more detailed definition, readers arereferred to the Jargon File [Raymond].In the "real world", various media people have taken the word "hacker"and coerced it into meaning the same as "cracker" - this usageoccasionally appears on USENET, with disastrous and confusing results.Posters to the security newsgroups should note that they currently riska great deal of flamage if they use the word "hacker" in place of"cracker" in their articles.NB: nowhere in the above do I say that crackers cannot be true hackers.It's just that I don't say that they are...Q.3 What is "security through obscurity"Security Through Obscurity (STO) is the belief that a system of any sortcan be secure so long as nobody outside of its implementation group isallowed to find out anything about its internal mechanisms.  Hidingaccount passwords in binary files or scripts with the presumption that"nobody will ever find it" is a prime case of STO.STO is a philosophy favoured by many bureaucratic agencies (military,governmental, and industrial), and it used to be a major method ofproviding "pseudosecurity" in computing systems.Its usefulness has declined in the computing world with the rise of opensystems, networking, greater understanding of programming techniques, aswell as the increase in computing power available to the average person.The basis of STO has always been to run your system on a "need to know"basis.  If a person doesn't know how to do something which could impactsystem security, then s/he isn't dangerous.Admittedly, this is sound in theory, but it can tie you into trusting asmall group of people for as long as they live.  If your employees getan offer of better pay from somewhere else, the knowledge goes withthem, whether the knowledge is replaceable or not.  Once the secret getsout, that is the end of your security.Nowadays there is also a greater need for the ordinary user to knowdetails of how your system works than ever before, and STO falls down aas a result.  Many users today have advanced knowledge of how theiroperating system works, and because of their experience will be able toguess at the bits of knowledge that they didn't "need to know".  Thisbypasses the whole basis of STO, and makes your security useless.Hence there is now a need is to to create systems which attempt to bealgorithmically secure (Kerberos, Secure RPC), rather than justphilosophically secure.  So long as your starting criteria can be met,your system is LOGICALLY secure."Shadow Passwords" (below) are sometimes dismissed as STO, but this isincorrect, since (strictly) STO depends on restricting access to analgorithm or technique, whereas shadow passwords provide security byrestricting access to vital data.Q.4 What makes a system insecure?Switching it on.  The adage usually quoted runs along these lines: "The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards.  Even then, I wouldn't stake my life on it."(the original version of this is attributed to Gene Spafford)A system is only as secure as the people who can get at it.  It can be"totally" secure without any protection at all, so long as its continuedgood operation is important to everyone who can get at it, assuming allthose people are responsible, and regular backups are made in case ofhardware problems.  Many laboratory PC's quite merrily tick away thehours like this.The problems arise when a need (such as confidentiality) has to befulfilled.  Once you start putting the locks on a system, it is fairlylikely that you will never stop.Security holes manifest themselves in (broadly) four ways:1) Physical Security Holes.- Where the potential problem is caused by giving unauthorised personsphysical access to the machine, where this might allow them to performthings that they shouldn't be able to do.A good example of this would be a public workstation room where it wouldbe trivial for a user to reboot a machine into single-user mode and muckaround with the workstation filestore, if precautions are not taken.Another example of this is the need to restrict access to confidentialbackup tapes, which may (otherwise) be read by any user with access tothe tapes and a tape drive, whether they are meant to have permission ornot.2) Software Security Holes- Where the problem is caused by badly written items of "privledged"software (daemons, cronjobs) which can be compromised into doing thingswhich they shouldn't oughta.The most famous example of this is the "sendmail debug" hole (seebibliography) which would enable a cracker to bootstrap a "root" shell.This could be used to delete your filestore, create a new account, copyyour password file, anything.(Contrary to popular opinion, crack attacks via sendmail were not justrestricted to the infamous "Internet Worm" - any cracker could do thisby using "telnet" to port 25 on the target machine.  The story behind asimilar hole (this time in EMACS) is described in [Stoll].)New holes like this appear all the time, and your best hopes are to:  a: try to structure your system so that as little software as possible  runs with root/daemon/bin privileges, and that which does is known to  be robust.  b: subscribe to a mailing list which can get details of problems  and/or fixes out to you as quickly as possible, and then ACT when you  receive information.3) Incompatible Usage Security Holes- Where, through lack of experience, or no fault of his/her own, theSystem Manager assembles a combination of hardware and software whichwhen used as a system is seriously flawed from a security point of view.It is the incompatibility of trying to do two unconnected but usefulthings which creates the security hole.Problems like this are a pain to find once a system is set up andrunning, so it is better to build your system with them in mind.  It'snever too late to have a rethink, though.Some examples are detailed below; let's not go into them here, it wouldonly spoil the surprise.4) Choosing a suitable security philosophy and maintaining it.>From: Gene Spafford <spaf@cs.purdue.edu>>The fourth kind of security problem is one of perception and>understanding.  Perfect software, protected hardware, and compatible>components don't work unless you have selected an appropriate security>policy and turned on the parts of your system that enforce it.  Having>the best password mechanism in the world is worthless if your users>think that their login name backwards is a good password! Security is>relative to a policy (or set of policies) and the operation of a system>in conformance with that policy.Q.5 What tools are there to aid security?1) "COPS"Managed by Dan Farmer, this is a long established suite of shell scriptswhich forms an extensive security testing system; There is a rudimentarypassword cracker, and routines to check the filestore for suspiciouschanges in setuid programs, others to check permissions of essentialsystem and user files, and still more to see whether any system softwarebehaves in a way which could cause problems.The software comes in two versions - one written in Perl and one(largely equivalent) written in shell scripts.  The latest version isvery up-to-date on Unix Security holes.2) "Crack" (+ "UFC").Written by Alec Muffett, this is a program written with one purpose in

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91视频你懂的| 日韩精品一区在线| 韩国一区二区视频| 亚洲一区二区三区四区在线观看 | 玖玖九九国产精品| 综合久久久久久| 精品第一国产综合精品aⅴ| 欧美三级视频在线| www.亚洲免费av| 九色|91porny| 日本不卡一区二区| 亚洲制服丝袜av| 亚洲色图欧洲色图| 国产精品乱码妇女bbbb| 欧美tk丨vk视频| 337p亚洲精品色噜噜| 在线观看亚洲a| 91免费版在线| 97精品电影院| av男人天堂一区| 成人毛片视频在线观看| 韩国av一区二区三区四区| 日韩高清一区二区| 视频一区视频二区中文| 亚洲国产日产av| 亚洲午夜成aⅴ人片| 亚洲在线免费播放| 一区二区三区丝袜| 亚洲综合图片区| 亚洲线精品一区二区三区| 一区二区三区四区不卡在线| 亚洲三级在线播放| 亚洲欧美一区二区久久 | 美女一区二区三区在线观看| 亚洲一区二区三区在线| 亚洲久草在线视频| 一区二区三区四区亚洲| 亚洲日本一区二区| 亚洲综合激情小说| 亚洲大型综合色站| 日韩和的一区二区| 石原莉奈在线亚洲二区| 日韩电影一区二区三区| 日本中文字幕一区二区视频| 日本欧美在线观看| 精品一区二区三区久久| 国内精品视频666| 国产一区二区三区在线观看精品| 久久精品国产精品青草| 国内精品免费在线观看| 国产suv精品一区二区三区| 成人污污视频在线观看| 色综合久久天天综合网| 欧美性xxxxx极品少妇| 欧美日韩国产在线观看| 日韩一区国产二区欧美三区| 欧美大度的电影原声| 精品国产乱子伦一区| 中文无字幕一区二区三区| 国产精品免费久久| 亚洲午夜私人影院| 免费看黄色91| 不卡av电影在线播放| 在线一区二区三区四区五区 | 日本中文字幕一区二区视频| 精品伊人久久久久7777人| 高清beeg欧美| 精品视频在线免费看| 日日摸夜夜添夜夜添精品视频| 麻豆国产一区二区| proumb性欧美在线观看| 欧美优质美女网站| 精品久久久久久久人人人人传媒| 久久久久久久久久美女| 亚洲欧美成人一区二区三区| 日本欧美肥老太交大片| 成人深夜视频在线观看| 欧美性欧美巨大黑白大战| 欧美大片在线观看一区| 亚洲欧美国产77777| 毛片不卡一区二区| 99精品桃花视频在线观看| 911精品国产一区二区在线| 国产精品网友自拍| 日本网站在线观看一区二区三区| 大陆成人av片| 日韩一区二区在线观看视频| 亚洲视频一区二区免费在线观看 | 国产一区二三区好的| 色999日韩国产欧美一区二区| 日韩免费视频一区| 亚洲一区二区四区蜜桃| 成人免费观看视频| 日韩精品专区在线影院观看| 一区二区三区在线观看动漫 | 精品1区2区3区| 中文字幕亚洲在| 久草这里只有精品视频| 色呦呦国产精品| 中文在线一区二区| 国产一区二区三区在线观看免费 | 337p亚洲精品色噜噜狠狠| 国产精品久久二区二区| 久热成人在线视频| 欧美日韩在线播放三区| 一色桃子久久精品亚洲| 国产综合久久久久久鬼色| 777欧美精品| 亚洲国产成人av| 色噜噜久久综合| 亚洲欧美怡红院| 懂色av一区二区夜夜嗨| 2020国产成人综合网| 蜜臀av一区二区| 在线电影欧美成精品| 亚洲精品久久久蜜桃| 成人avav在线| 国产精品久久午夜夜伦鲁鲁| 国产精品1区二区.| 精品国产一区久久| 久久成人久久爱| 欧美成人vr18sexvr| 日本中文在线一区| 欧美一区二区三区在线视频| 亚洲高清不卡在线观看| 欧美体内she精高潮| 亚洲国产精品一区二区久久 | 国产欧美视频在线观看| 乱中年女人伦av一区二区| 91精品国产麻豆| 喷白浆一区二区| 精品99999| 国产福利不卡视频| 欧美韩日一区二区三区| 成人晚上爱看视频| √…a在线天堂一区| 97精品电影院| 成人福利视频网站| 国产精品免费丝袜| av不卡免费在线观看| 亚洲欧美激情视频在线观看一区二区三区| 成人av手机在线观看| 亚洲欧美一区二区三区国产精品| 日本道色综合久久| 亚洲综合在线电影| 7777精品伊人久久久大香线蕉| 日韩精品免费视频人成| 欧美大尺度电影在线| 九九热在线视频观看这里只有精品| 日韩欧美不卡在线观看视频| 国产综合色精品一区二区三区| 久久久亚洲精品石原莉奈| 成人黄色国产精品网站大全在线免费观看 | 北条麻妃国产九九精品视频| 亚洲麻豆国产自偷在线| 欧美日韩中字一区| 美日韩一区二区三区| 国产片一区二区| 欧洲视频一区二区| 看片网站欧美日韩| 国产精品国产三级国产aⅴ原创 | 国产经典欧美精品| 亚洲男人的天堂av| 欧美丰满少妇xxxxx高潮对白| 男人的天堂亚洲一区| 国产视频在线观看一区二区三区| 成人综合日日夜夜| 亚洲一二三区在线观看| 精品国内片67194| www.亚洲人| 青青青伊人色综合久久| 日韩精品一区二区三区视频 | 色综合久久99| 免费欧美在线视频| 国产精品久久久久久久久动漫| 欧美在线观看一区| 国产精品88888| 亚洲成人777| 国产精品看片你懂得| 欧美另类一区二区三区| 国产91精品欧美| 日产国产欧美视频一区精品| 国产精品久久久久久久久免费相片| 欧美色网站导航| 丁香一区二区三区| 美女一区二区三区在线观看| 亚洲乱码中文字幕综合| 精品黑人一区二区三区久久| 色一区在线观看| 国产精品99久久久| 日本女人一区二区三区| 亚洲男人的天堂av| 国产亚洲欧洲997久久综合| 欧美日本一区二区三区| 成人av网站在线观看| 看电影不卡的网站| 亚洲成人自拍偷拍| 国产精品久久久久久久久搜平片| 欧美一级久久久| 欧美日韩免费不卡视频一区二区三区|