Network Security Hacks: Tips & Tools for Protecting Your Privacy

 

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

daemon option, SnortSam 

data size for packets (Snort, dsize option) 

databases

    Barnyard output to 

    Barnyard support for 

    MySQL  [See MySQL]

    NIDS, tracking alerts with ACID 

    round-robin database (RRD) 

    Snort, configuring to use 

    Tripwire database  2nd 

dd command 

debugging, logging information for 

default shares (Windows networks) 

defaultkey option, SnortSam 

deny policy (PacketFilter) 

depth and offset options, Snort rules 

DESX encryption algorithm 

device nodes

    in chroot( ) environment 

    creating from programs in chroot( ) environment 

    for daemons in sandbox environment 

    preventing creation of with grsecurity 

directories

    dividing into read-only and read-write 

    loose permissions, scanning for 

dmesg utility, preceventing nonroot users from using 

DNS

    HTTP proxy difficulties with 

    SOCKS 4 problems with 

    testing by sniffdet tool 

    TXT records, using in encrypted connections 

domain name, scanning remote Windows systems by 

domain registrants, finding 

dontblock option, SnortSam 

drop option (PacketFilter) 

drop, sdrop, and reject rules, Snort_inline 

dsize option, Snort rules 

Dsniff 

dynamic and activate actions, Snort rules 

 

Категории