UEU-co logo

Category: Network Security Hacks

 < Day Day Up >  Got a Hack? To explore Hacks books online or to contribute a hack for future titles, visit: http://hacks.oreilly.com  < Day Day Up > 

 < Day Day Up >  Preface Nowhere is the term hacker more misconstrued than in the network security field. This is understandable because the very same tools that network security professionals use to probe the robustness of their own networks also can be used to launch attacks on any machine on the Internet. The difference between system […]

 < Day Day Up >      •  Table of Contents •  Index •  Reviews •  Reader Reviews •  Errata •  Academic Network Security Hacks By Andrew Lockhart   Publisher : O’Reilly Pub Date : April 2004 ISBN : 0-596-00643-8 Pages : 312 Slots : 1.0         Copyright     Credits       About the Author     […]

 < Day Day Up >  How This Book Is Organized Although each hack is designed to stand on its own, this book makes extensive use of cross-referencing between hacks. If you find a reference to something you’re interested in while reading a particular hack, feel free to skip around and follow it (much as you might while […]

 < Day Day Up >  Conventions Used in This Book The following typographical conventions are used in this book: Italic Indicates new terms, URLs, email addresses, filenames, file extensions, pathnames, directories, daemons, programs, and Unix utilities. Constant width Indicates commands, options, switches, variables, attributes, keys, functions, types, classes, namespaces, methods, modules, properties, parameters, values, objects, events, event […]

 < Day Day Up >  Using Code Examples This book is here to help you get your job done. In general, you may use the code in this book in your programs and documentation. You do not need to contact us for permission unless you’re reproducing a significant portion of the code. For example, writing a program […]

 < Day Day Up >  How to Contact Us Please address comments and questions concerning this book to the publisher: O’Reilly & Associates 1005 Gravenstein Highway North Sebastopol, CA 95472 (800) 998-9938 (in the United States or Canada) (707) 829-0515 (international or local) (707) 829-0104 (fax) We have a web page for this book, where we list […]

 < Day Day Up >  Contributors The following people contributed their hacks, writing, and inspiration to this book: Oktay Altunergil is the founder of The Free Linux CD Project (http://www.freelinuxcd.org) and one of the maintainers of Turk-PHP.com (a Turkish PHP portal). He also works full-time as a Unix system administrator and PHP programmer. Michael D. (Mick) Bauer […]

 < Day Day Up >  Acknowledgments I would first like to thank the illustrious DJ Jackalope (aka Karen) for all of her encouragement, support, and understanding throughout the writing of this book. Without her, it would have languished in the doldrums, and I don’t think I could have done this book without her. I’d also like to […]

 < Day Day Up >  Credits About the Author Contributors Acknowledgments  < Day Day Up > 

 < Day Day Up >  Why Network Security Hacks? Network Security Hacks is a grimoire of 100 powerful security techniques. This volume demonstrates effective methods for defending your servers and networks from a variety of devious and subtle attacks. Within this book are examples of how to detect the presence (and track every keystroke) of network intruders, […]

 < Day Day Up >  About the Author Andrew Lockhart is originally from South Carolina but currently resides in northern Colorado, where he spends his time trying to learn the black art of auditing disassembled binaries and trying to keep from freezing to death. He holds a BS in computer science from Colorado State University and has […]

 < Day Day Up >  Chapter 8. Recovery and Response Hacks #96-100 Section 96.  Image Mounted Filesystems Section 97.  Verify File Integrity and Find Compromised Files Section 98.  Find Compromised Packages with RPM Section 99.  Scan for Root Kits Section 100.  Find the Owner of a Network  < Day Day Up > 

 < Day Day Up >  Colophon Our look is the result of reader comments, our own experimentation, and feedback from distribution channels. Distinctive covers complement our distinctive approach to technical topics, breathing personality and life into potentially dry subjects. The image on the cover of Network Security Hacks is barbed wire. The type of barbed wire pictured […]

 < Day Day Up >  Copyright © 2004 O’Reilly Media, Inc. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly & Associates books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact […]

No related posts found…


apply_now Pepperstone Group Limited