18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[Part IV] Network and <strong>Internet</strong> <strong>Sec</strong>urity<br />

Part IV<br />

Part IV: Network and <strong>Internet</strong> <strong>Sec</strong>urity<br />

This part of the book is about the ways in which individual <strong>UNIX</strong> computers communicate with one<br />

another and with the outside world, and the ways that these systems can be subverted by attackers to<br />

break into your computer system. Because many attacks come from the outside, this chapter is vital<br />

reading for anyone whose computer has outside connections.<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

●<br />

Chapter 14, Telephone <strong>Sec</strong>urity, describes how modems work and provides step-by-step<br />

instructions for testing your computer's modems to see if they harbor potential security problems.<br />

Chapter 15, UUCP, is about the <strong>UNIX</strong>-to-<strong>UNIX</strong> copy system, which can use standard phone lines<br />

to copy files, transfer electronic mail, and exchange news. This chapter explains how UUCP works<br />

and tells you how to make sure that it can't be subverted to damage your system.<br />

Chapter 16, TCP/IP Networks, provides background on how TCP/IP networking programs work<br />

and describes the security problems they pose.<br />

Chapter 17, TCP/IP Services, discusses the common IP network services found on <strong>UNIX</strong> systems,<br />

coupled with common problems and pitfalls.<br />

Chapter 18, WWW <strong>Sec</strong>urity, describes some of the issues involved in running a WWW server<br />

without opening your system to security problems. The issues discussed here should also be borne<br />

in mind when operating any other kind of network-based information server.<br />

Chapter 19, RPC, NIS, NIS+, and Kerberos, discusses a variety of network information services. It<br />

covers some of how they work, and common pitfalls.<br />

Chapter 20, NFS, describes how Sun Microsystems' Network Filesystem works and its potential<br />

security problems.<br />

13.3 Outsiders 14. Telephone <strong>Sec</strong>urity<br />

[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | <strong>Practical</strong> <strong>Sec</strong>urity ]<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/part04.htm [2002-04-12 10:45:55]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!