Network Security Hacks: Tips & Tools for Protecting Your Privacy

 

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

C library calls supported by Unix 

CA  [See Certificate Authority]

cache poisioning (ARP) 

CAP_LINUX_IMMUTABLE capability 

capabilities model (Linux), modifying 

centralized logging, aggregating logs from remote sites 

Certificate Authority (CA) 

    creating your own 

        public and private keys 

    distributing CA certificate to clients 

    Well-known Certificate Authorities 

certificate-signing request 

certificates, SSL

    Apache SSL installation 

    creating and using with OpenVPN 

    creating for use with Sguil 

    for SnortCenter sensor 

    IMAP and POP, creating for 

    Nessus, generating for 

    self-signed, creating 

CGI interface, running Perl scripts and PHP programs through 

CGI scripts, enabling for user directories 

chains (Netfilter) 

check_ssh plug-in (Nagios) 

checksums

    MD5, maintained by RPM for installed files 

    modification of system MD5 program by attackers 

    system disk, generating for 

chkrootkit 

chmod command 

chpax utility 

chroot command 

chroot( ) environment 

    availability of other programs within 

    BIND, running in 

    enhanced security using grsecurity 

    MySQL, running in 

    services running in 

    UID 0, risks of 

CIDR notation

    for network addresses 

    ranges of IP addresses for Snort rules 

clocks (server), synchronizing 

code examples, using 

commands, logging use by users 

compiler-based solutions to stack-smashing attacks 

compression

    LZO, use with OpenVPN 

    SSH, built-in 

connect time, analyzing for users on system 

content option, Snort rules  2nd 

content type for file upload 

cookies, preventing SQL injection in 

copying system disks, bit-for-bit 

cross-site scripting (XSS) attacks 

cryptographic signature verification, automating 

cryptography

    encrypted tunnel, VTun 

    encrypting IMAP and POP with SSL 

    encrypting temp folder on Windows 

    encrypting traffic with SSH 

    keys for protection of Tripwire files 

    opportunistic encryption with FreeS/WAN 

    public keys, security concerns with 

    SFS (Self-certifying File System) 

    SSL encryption 

    TLS encryption, setting up for SMTP 

curses-based GUI, configuring kernel to enable grsecurity 

 

Категории