Real World Linux Security Prentice Hall Ptr Open Source Technology Series
Table 2.1 Most Frequent Linux Break-Ins Table 2.2 Meaning of TCP Status Bits Table 2.3 Dangerous Services Table 2.4 Sendmail DoS Fortification Table 3.1 NIC drivers supporting changeable MACs Table 3.2 NIC drivers not supporting changeable MACs Table 4.1 Sendmail Security Options Table 4.2 /etc/mail/access Instructions Table 4.3 Services Squid Allows by Default Table 5.1 Linux/UNIX Diagnostic Services Table 6.1 Dangerous Netscape Applications Table 6.2 Recommended Device Permissions Table 6.3 Dangerous CGI Input Characters Table 11.1 Promiscuous Variations Table 12.1 Private Network Numbers Table 12.2 Common ICMP Packet Types Table 12.3 Types of Packet Service Table 12.4 Private Network Numbers Table 12.5 Common ICMP Packet Types Table 12.6 Types of Packet Service Table 12.7 Variables in rc.fw Table 12.8 Basic Firewall Rules Table 17.1 Web Site Defacements (per year) Table C.1 Port Number Ranges Table C.2 Well-Known Port Numbers Table C.3 Registered Port Numbers Table D.1 Danger Levels |
| Top |