亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? an architectural overview of unix network security.htm

?? 黑客培訓(xùn)教程
?? HTM
?? 第 1 頁(yè) / 共 4 頁(yè)
字號(hào):
     Programmers can assist in the effort of security by reducingthe chance that a potential intruder can exploit a hole or bugthat is coded into locally developed software.  There is probablya lot that can be said about this, and their are probably manybooks on the subject somewhere.  But, here are some commonrecommendations:  (a) Never create a SETUID shell script.  Thereare well-known techniques used by intruders to gain access to ashell program that is running as root; (b) List the complete filename, including the full path in any system() or popen() call;and (c) Since there is no reason for users to have read access toa SETUID file (or any exectuble for that matter), set permissionsto 4711 (SETUID) or 711 (Non-SETUID).<P><H4> 3.5.8  Counterintelligence</H4><P>     To extend your security program to seek out, identify, andlocate intruders;  you may want to modify some of the securitytools (especially those proxy service daemons and event-drivenauditors) to trace intruders back to their source, and otherwisemaintain logs of data on intrusion attempts.  This informationcan prove vital in taking an offensive stance against securitybreak-in's and can help prosecute offenders.<P><H4>3.5.9  Other Possibilities</H4><P>     Depending on your requirements you might look intospecialized solutions such as Compartmented Mode Workstations(CMW), end-to-end Data Link Encryption (STU-III, Motorola NES,and XEROX XEU are examples), and TEMPEST.  The NCSC (RainbowSeries) and ITSEC specifications can help you define what levelof need you have for security and help lead you to additionaltypes of solutions.<P><H3>3.6  SECURITY POLICY</H3><P>     Everything discussed in layers {1...5} (sections 3.1 to 3.5)above involve specific things you can do, tools and techniques toimplement, to address a particular area or "hole" in security.   Your SECURITY POLICY is what ties all of that together into acohesive and effective SECURITY PROGRAM.  There are many diverseissues to consider when formulating your policy, which alone isone of the biggest reasons why you must have one:<P><pre>         What are the functional requirements of your          network?         How secure do you need to be?  What needs to          be protected?         How will you handle incident reporting and          prosecution?         What does the law require you to do?  What          about privacy?  Since break-ins often occur          via multiple hops on computers throughout the          US and the rest of the world, you will need          to consider a variation of federal, state,          local, as well as foreign laws.         Make security a dedicated and deliberate          effort.         User training and security awareness.         What is considered acceptable use for users?             Do the users understand what it is they are          permitted to do and what it is they are not          permitted to do?         What is considered acceptable use for system          administration staff?  Is using Crack to test          passwords okay?  Is giving friends outside          the organization accounts okay?         Maintain a working relationship with the          Computer Emergency Response Team (CERT) at          Carnegie Mellon University (CMU) and your          Forum of Incident Response and Security Teams          (FIRST) regional representative "CERT" team.         PLUS a myriad of different issues too          numerous to go  into in a summary paper.</pre><P>     By answering these questions you determine what packages andmethods in layers {1...5} (or their equivalent) that you want toimplement, and in what ways you want to modify or configure them.   "A security policy is a formal specification of the rules bywhich people are given access to a computer and its resources."   (and to extend that to say...a network and its resources).   Whatever tools you install to help you maintain the security ofyour network and monitor it, they must be configured to implementYOUR POLICY, or else they are not doing the whole job that needsto be done.  Therefore, you must first have a POLICY.<P>     For additional help in the area of policy development,contact cert@cert.org.  They can direct you to usefuldocumentation on the subject and guide you to your FIRST regionalCERT team representative.  A good starting point is Request ForComments (RFC) 1244 "Site Security Handbook" (96 pages), which isavailable via anonymous FTP from numerous RFC archive sites (forexample:  nic.ddn.mil).<P><H2>4.  SUMMARY OF AVAILABILITY</H2><P><pre>Section   Name           Availability3.2       Router         Cisco, Wellfleet, Proteon3.3.1     Tcp_wrapper    cert.org:/pub/tools/tcp_wrappers3.3.2     Socks          s1.gov:/pub/socks.tar.Z3.3.3     Kernel_wrap    eecs.nwu.edu:/pub/securelib3.3.4     Swatch         sierra.stanford.edu:/pub/sources3.3.5     CAP            e-mail to thompsond@orvb.saic.com3.3.6     Mail Gateway3.3.7     Tty_wrapper3.3.8     HSC-Gatekeeper e-mail to Herve.Schauer@hsc-sec.fr3.3.9     AT&T INET      e-mail to ches@research.att.com3.4.1     COPS           cert.org:/pub/tools/cops3.4.2     Chkacct        cc.perdue.edu:/pub/chkacctv1.1.tar.Z3.4.3     Crack          cert.org:/pub/tools/crack/crack_4.1-tar.Z3.4.4     Shadow         comp.sources.misc (jfh@rpp386.cactus.org).3.4.5     Passwd+        dartmouth.edu:/pub/passwd+tar.Z3.4.6     Audit          e-mail to bjorn@sysadmin.com3.4.7     Miro           e-mail to miro@cs.cmu.edu3.5.1     Key-card       e-mail to cert@cert.org3.5.2     TIS/PEM        e-mail to pem-info@tis.com3.5.3     Kerberos       athena-dist.mit.edu:/pub/kerberos53.5.4     Private-key    contact Don Davis, at Geer Zolot Assoc.3.5.5     MLS            contact your UNIX vendor3.5.6     File encrypt   contact your UNIX vendor3.5.7     Programming3.5.8     Counter-Intel3.5.9     Other Poss.    research and contact various vendors3.6       Policy         RFC 1244 and cert@cert.org</pre><P><H2>5.  ADDITIONAL SOURCES OF INFORMATION</H2><P>     There are several primary sources of information that you cantap into (and correspond with) to keep up to date with currenthappenings in the general network security and in specific the"firewall" community.  I recommend subscribing to the followingmailing lists:  (a) cert-advisory-request@cert.org; (b) cert-tools-request@cert.org, and (c) firewalls@greatcircle.com.  In additionto that read and participate in the following USENET newsgroups:   (a) comp.security.announce (which echos the CERT advisory mailinglist); (b) comp.security.misc; (c) alt.security (frequentlydissolves into "flame wars"); (d) comp.risks; and (e) comp.virus(almost exclusively for discussing PC and MAC viruses).  Also, youcan copy files from the CERT USENET Clipping Archive via anonymousFTP from cert.org.<P><pre>CERT Contact Information:Emergencies:   +1 412 268-7090FAX:           +1 412 268-6989E-mail:        cert@cert.org</pre><P><pre>U.S. Mail:     CERT Coordination Center               Software Engineering Institute               Carnegie Mellon University               4500 Fifth Avenue               Pittsburgh, PA 15213-3890, USA</pre><P>USENIX Papers are available directly from USENIX:<P>The USENIX Association<br>2560 Ninth Street, Suite 215<BR>Berkeley, CA 94710, USA<P><H2>6.  Acknowledgements</H2><P>     The author extends thanks to several of the authors of thetools discussed in this paper and others for providing feedbackthat effected several changes in the first couple drafts of thispaper.  This includes but, is not limited to the following:  EdDeHart (CERT), Jim Ellis (CERT), David and Michelle Koblas (SOCKS),Herve Schauer (Gatekeeper), Dan Farmer (COPS), D. Brent Chapman(firewalls@greatcircle.com), and Matt Bishop (Editor).<P><H2>7.  References</H2><P><pre>[1]  S. Carl-Mitchell and John S. Quarterman, Building Internet        Firewalls. UnixWorld; February, 1992; pp 93-102.[2]  Wietse Venema.  TCP Wrapper: Network Monitoring, Access     Control and Booby Traps.  USENIX Proceedings, UNIX Security     Symposium III; September 1992.[3]  David and Michelle Koblas.  SOCKS.  USENIX Proceedings, UNIX     Security Symposium III; September 1992.[4]  William LeFebvre.  Restricting Access to System Daemons Under     SunOS.  USENIX Proceedings, UNIX Security Symposium III;     September 1992.[5]  D. Brent Chapman.  Network (In)Security Through IP Packet     Filtering.  USENIX Proceedings, UNIX Security Symposium III;     September 1992.[6]  Stephen E. Hansen and E. Todd Atkins.  Centralized System     Monitoring with Swatch.  USENIX Proceedings, UNIX Security     Symposium III; September 1992.[7]  J. David Thompson and Kate Arndt.  A Secure Public Network     Access Mechanism.  USENIX Proceedings, UNIX Security Symposium     III; September 1992.[8]  Herve Schauer.  An Internet Gatekeeper.  USENIX Proceedings,     UNIX Security Symposium III; September 1992.[9]  William Cheswick.  The Design of a Secure Internet Gateway.        Murray Hill, NJ:  AT&T Bell Laboratories.[10] Garfinkel, Simson, and Gene Spafford.  Firewall Machines.        Practical UNIX Security.  Sabastopol, CA: O'Reilly and     Associates, Inc., 1991.[11] Shabbir J. Safdar.  Giving Customers the Tools to Protect     Themselves.  USENIX Proceedings, UNIX Security Symposium III;     September 1992.[12] John F. Haugh, II.  Introduction to the Shadow Password Suite.        USENIX Proceedings, UNIX Security Symposium III; September     1992.[13] Matt Bishop.  Anatomy of a Proactive Password Checker.  USENIX     Proceedings, UNIX Security Symposium III; September 1992.[14] Bjorn Satdeva.  Audit: A Policy Driven Security Checker for a     Heterogeneous Environment.  USENIX Proceedings, UNIX Security     Symposium III; September 1992.[15] Allan Heydon and J.D. Tygar.  Specifying and Checking UNIX     Security Constraints.  USENIX Proceedings, UNIX Security     Symposium III; September 1992.   [16] James M. Galvin and David M. Balenson.  Security Aspects of a     UNIX PEM Implementation.  USENIX Proceedings, UNIX Security     Symposium III; September 1992.[17] Don Davis.  Network Security Via Private-Key Certificates.        USENIX Proceedings, UNIX Security Symposium III; September     1992.</PRE><P>------------------------NOTICE---DISCLAIMER------------------------<br>The contents of this paper do not necessarily reflect the opinionsof my employer or anyone else that I know.  Nothing in this papershould be construed as a product endorsement.  No warranty isexpressed or implied.  Any comments?  Please send me e-mail.-------------------------------------------------------------------<P>------------------------NOTICE---COPYRIGHT-------------------------<br>(c) Copyright 1992,1993 Robert B. Reinhardt.  This paper may bedistributabed freely as long as the paper is not modified in any way,includes this notice, and is provided without guarantee or warrantyexpressed or implied.  E-mail comments to breinhar@access.digex.com-------------------------------------------------------------------</pre></body>

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
高清成人在线观看| 色视频成人在线观看免| 亚洲日穴在线视频| 日韩免费福利电影在线观看| 国产成人综合精品三级| 亚洲国产视频一区二区| 中文字幕第一区综合| 日韩一级二级三级精品视频| 一本到不卡精品视频在线观看| 久久成人精品无人区| 亚洲成人综合网站| 亚洲同性gay激情无套| 精品欧美一区二区三区精品久久 | 懂色中文一区二区在线播放| 亚洲成人av电影| 伊人色综合久久天天人手人婷| 26uuu色噜噜精品一区二区| 欧美美女网站色| 在线欧美日韩精品| 91小视频在线观看| 99久久免费国产| 成人午夜激情在线| 精品人在线二区三区| 欧美精品777| 精品视频999| 欧美日韩免费视频| 欧美日韩精品欧美日韩精品一综合| 成人精品一区二区三区四区| 国产在线乱码一区二区三区| 日本不卡视频在线观看| 亚洲图片欧美一区| 亚洲国产精品综合小说图片区| 亚洲精品国久久99热| 1区2区3区精品视频| 国产精品网站在线播放| 国产精品网站在线| 自拍偷拍欧美激情| 亚洲美女在线一区| 亚洲一线二线三线视频| 亚洲一区二区三区爽爽爽爽爽| 亚洲制服丝袜在线| 亚洲成在人线在线播放| 日精品一区二区| 麻豆国产欧美日韩综合精品二区| 日本视频在线一区| 精品一区二区三区免费观看| 老司机一区二区| 国产精品影音先锋| 岛国一区二区三区| 99久久婷婷国产综合精品电影| av中文字幕不卡| 在线观看亚洲a| 欧美日韩一级大片网址| 日韩午夜在线观看| 久久久99久久| 日韩美女视频一区二区| 亚洲一二三级电影| 美女国产一区二区| 成人手机电影网| 欧洲国产伦久久久久久久| 欧美久久久久久久久中文字幕| 日韩女优制服丝袜电影| 国产欧美综合在线| 亚洲一区二区三区四区在线| 视频一区在线视频| 国产成人精品免费视频网站| 99re8在线精品视频免费播放| 欧美日免费三级在线| 日韩欧美的一区| 国产精品视频yy9299一区| 夜夜嗨av一区二区三区中文字幕 | 国产mv日韩mv欧美| 91美女蜜桃在线| 日韩女优毛片在线| 国产精品成人免费精品自在线观看 | 青青青伊人色综合久久| 国产精品一卡二| 欧美亚洲综合在线| 精品福利一区二区三区| 亚洲欧美在线视频观看| 日韩精品色哟哟| 成人av免费在线| 日韩午夜激情av| 亚洲色图欧美偷拍| 精品一区二区精品| 欧美日韩一区二区三区四区 | 中文字幕第一页久久| 婷婷夜色潮精品综合在线| 国产馆精品极品| 欧美一区二区免费视频| 国产精品理论片在线观看| 蜜臀精品久久久久久蜜臀| www.66久久| 26uuu亚洲综合色| 性做久久久久久免费观看欧美| 国产精品亚洲视频| 日韩欧美在线一区二区三区| 亚洲天堂成人网| 床上的激情91.| 26uuu国产在线精品一区二区| 亚洲已满18点击进入久久| 国产成人久久精品77777最新版本| 欧美欧美欧美欧美首页| 综合分类小说区另类春色亚洲小说欧美| 久草在线在线精品观看| 91色九色蝌蚪| 中文在线一区二区| 国产自产2019最新不卡| 欧美顶级少妇做爰| 亚洲午夜视频在线| 91成人免费在线| 最新国产成人在线观看| 国产成人午夜精品5599| 欧美精品一区二区三区高清aⅴ| 亚洲成av人**亚洲成av**| 91在线视频网址| 欧美极品另类videosde| 国内外成人在线| 亚洲精品在线三区| 久久狠狠亚洲综合| 日韩一区国产二区欧美三区| 亚洲一区二区三区激情| 日本福利一区二区| 亚洲免费观看视频| 91精品福利在线| 亚洲色图在线看| 91免费在线视频观看| 国产精品不卡一区二区三区| 国产传媒久久文化传媒| 久久精品免视看| 国产高清在线精品| 国产精品热久久久久夜色精品三区| 国产伦精品一区二区三区在线观看| 欧美成人女星排名| 激情五月播播久久久精品| 精品久久久久99| 国产精品一区二区在线看| 精品国产乱码久久久久久影片| 美女在线视频一区| 久久久久久久久久久电影| 国产一区二区三区四区五区入口 | 国产精品久久午夜夜伦鲁鲁| 国产成人免费网站| 国产精品久久777777| 91蜜桃网址入口| 亚洲成av人片在线观看无码| 欧美日韩国产高清一区二区三区| 午夜免费欧美电影| 欧美变态tickle挠乳网站| 捆绑变态av一区二区三区| 久久美女艺术照精彩视频福利播放| 国产乱国产乱300精品| 国产精品久久久久久久岛一牛影视| 99re热这里只有精品视频| 夜夜嗨av一区二区三区网页| 欧美日韩一区三区| 九色porny丨国产精品| 久久久精品影视| 色一情一乱一乱一91av| 亚洲成人动漫精品| 精品粉嫩超白一线天av| 粉嫩一区二区三区性色av| 亚洲啪啪综合av一区二区三区| 欧美日韩国产高清一区二区| 久久精品国产亚洲a| 国产精品久久久久永久免费观看 | 天堂精品中文字幕在线| 精品成人私密视频| 91天堂素人约啪| 肉色丝袜一区二区| 国产欧美久久久精品影院| 在线观看免费视频综合| 免费观看在线综合| 亚洲欧洲日产国码二区| 欧美日韩一级二级| 成人午夜免费av| 亚洲福利视频三区| 国产欧美精品一区| 欧美另类一区二区三区| 国产精品一区二区三区乱码| 亚洲精品国产精华液| 精品福利二区三区| 欧美日韩一级二级三级| 国产福利一区在线| 丝袜美腿亚洲色图| 亚洲视频免费看| 久久久久久久久久美女| 欧美日韩极品在线观看一区| 国产成人午夜片在线观看高清观看| 亚洲妇熟xx妇色黄| 中文字幕日韩一区二区| 欧美成人aa大片| 欧美探花视频资源| 99久久伊人久久99| 国产九九视频一区二区三区| 亚洲成国产人片在线观看| 国产精品伦理一区二区| 精品久久久三级丝袜| 欧美视频在线观看一区二区| 成人免费高清视频|