Hacker Linux Uncovered
Chapter 2: Linux Installation and Initial Configuration
- Figure 2.1: The main window of the PartitionMagic program
- Figure 2.2: The Keyboard Configuration dialog window
- Figure 2.3: The file Properties window
- Figure 2.4: The Disk Setup dialog window
- Figure 2.5: The Add Partition dialog window
- Figure 2.6: Configuring Linux boot loader
- Figure 2.7: The Set Root Password dialog window
- Figure 2.8: The Package Group Selection dialog window
- Figure 2.9: The About to Install dialog window
- Figure 2.10: The Monitor Configuration window
- Figure 2.11: The first-boot Welcome dialog window
- Figure 2.12: The User Account dialog window
- Figure 2.13: The boot loader dialog window
- Figure 2.14: The Linux booting process
- Figure 2.15: The login window
- Figure 2.16: The main window of the setup utility
- Figure 2.17: The KDE desktop
- Figure 2.18: The GNOME desktop
Chapter 3: Welcome to Linux!
- Figure 3.1: The Midnight Commander program launched in the terminal window
- Figure 3.2: Launching the Services utility from the Main Menu
- Figure 3.3: The main window of the Services utility
- Figure 3.4: A sample of the results produced by the top program
- Figure 3.5: The main window of the KPPP program
- Figure 3.6: The menuconfig utility
- Figure 3.7: The gconf utility
Chapter 4: Access Control
- Figure 4.1: A block diagram of a chroot file system
- Figure 4.2: A network firewall
- Figure 4.3: The Options tab
- Figure 4.4: The Rules tab
- Figure 4.5: The dialog window for adding new rules
- Figure 4.6: Location of the public and closed service servers
- Figure 4.7: Doubled network protection
- Figure 4.8: Protecting two networks with one firewall
- Figure 4.9: Replacing the IP address
Chapter 5: Administration
- Figure 5.1: The netconfig window
- Figure 5.2: The common-bus network topology
- Figure 5.3: The star network topology
- Figure 5.4: Channel encryption
- Figure 5.5: A secure connection indication in Internet Explorer
- Figure 5.6: An Internet page's properties
- Figure 5.7: Connecting to the Internet via a Web server
Chapter 7: Web Server
- Figure 7.1: The main window of the Apache graphical configuration utility
- Figure 7.2: The user authentication window
- Figure 7.3: Intercepting traffic
Chapter 8: Electronic Mail
- Figure 8.1: The main window of the KMail program
- Figure 8.2: The network configuration window
- Figure 8.3: The SMTP server configuration window
- Figure 8.4: The Local mailbox configuration window
Chapter 9: Gateway to Internet
- Figure 9.1: Accessing the Internet via a proxy server
- Figure 9.2: Configuring a proxy server in Mozilla
- Figure 9.3: Configuring Mozilla cache
Chapter 10: File Transfer
- Figure 10.1: The main window of CyD FTP Client XP
- Figure 10.2: A text file transmitted in the binary mode
- Figure 10.3: A text file transmitted in the ASCII mode
- Figure 10.4: The main window of the kwuftpd utility
Chapter 11: Network Addressing
- Figure 11.1: The domain namespace hierarchy
- Figure 11.2: DNS control windows
Chapter 12: System Monitoring
- Figure 12.1: A screenshot of the /var/log/messages file contents
Chapter 13: Backing Up and Restoring Data
- Figure 13.1: The iDisk site
Chapter 14: Advice from a Hacker
- Figure 14.1: The OSI model
- Figure 14.2: A network with two routers
- Figure 14.3: An example of an attack notification email
- Figure 14.4: Honey-pot network construction