Practical Guide to Software Quality Management (Artech House Computing Library)
| < Day Day Up > |
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] HA (high availability) hackers Apache web server and honeypots and rootkits web server attacks and halt -d commandhashing MD5 algorithm msyslog and 2nd security considerations SHA-1 algorithm TLS ciphers TSIGs andheaders envelope versus 2nd information leaks pflogd and trivially faking HELO request (SMTP) 2nd 3rdHIDS (host-based IDS) checksums installing overview 2nd HiFn chipsets high availability (HA) hmac-md5 hashing algorithm HOME_NET variable (snort.conf) Honeynet Project honeypots 2nd host-based firewalls 2nd hostname CARP interfaces and CNAME instead of HELO request httpd and internal mail servers launching jail 2nd matching plus sign and hosts.allow file 2nd hosts.deny file Hot Standby Router Protocol (HSRP) 2nd Hot-Cold firewall architecture Hot-Hot firewall architecture Hot-Standby firewall architecture 2nd 3rd Hot-Warm firewall architecture 2nd HSRP (Hot Standby Router Protocol) 2nd .htaccess files 2nd HTML Apache and entity encoding 2nd injection mod_include and 2nd separating locationsHTTP ACID and DAV standard and information leaks Snort and SSL and URL encoding 2ndhttpd chroot environment and MaxClients process size root access and two-tiered architecturehttpd.conf file CGI module (Apache) jails and launching MaxClients directive mod_include and modules and PHP and protecting SSL and SSLCipherSuite directive system immutable flag user overrides httpd.core file HTTPS 2nd 3rd human interface layer (TSK) |
| < Day Day Up > |