Unix
Home Up Certifications Interests Photo Album Links Search 

 

 

Home Up

 

* DISCLAIMER * Use this information at your own risk. I  will NOT assume ANY responsibility for the use, misuse, or abuse, of the information provided herein. The following information is provided for educational purposes ONLY. The information is NOT to be used for illegal purposes. 

 

Incident Handling Step by Step: Unix Trojan Programs

SecurityFocus.com Linux
Unix Security 
HP Unix Security Handbook 
Linux Administrator's Security Guide 
Basic SUN Security 
Securing Your Linux Box 
Adding Security to Common Linux Distributions

Securing Linux, Part 1

Securing Linux, Part 2 

SGI security Frequently Asked Questions (FAQ)
FreeBSD Security How-To 
Watching Your Logs 
Armoring Solaris
Armoring Linux
Know Your Enemy 

Know Your Enemy: II 

Know Your Enemy: III 
Playing with the Internet Daemons 
Setting up sendmail on a firewall 
A Short Course on Systems Administration and Security Under Unix 

Security holes manifest themselves in (broadly) four ways...
The Ultimate Beginner's Guide To Hacking And Phreaking 
Placing Backdoors into a UNIX computer
Placing Backdoors Through Firewalls
Anonymizing UNIX Systems
Unix System Security Issues
Linux Security Administrator's Guide
A Beginners Introduction To Hacking Around On The UNIX Operating System, Part II 
An Introduction To Hacking Around With The UNIX Operating System
Configuring an Internet Firewall and Home LAN With Linux
An Indepth Guide in Hacking UNIX and the concept of Basic Networking Utility
A walk around a hacked system 
How to cover your tracks - Theory and Background 

How to cover your tracks - Practice
Linux Security HOWTO 
Hacking Kit 
The Solaris Security FAQ 
Learn how to make your site more secure 

NFS Tracing By Passive Network Monitoring 
All you want to know about UNIX passwords
Getting A Handle On Internet Security 
UNIX: A Hacking Tutorial 

Advanced Networking Security 

UNIX Computer Security Checklist 
Intruder Detection Checklist 
Securing Internet Information Servers 
UNIX Configuration Guidelines 
Backdoors 

Problems With The FTP PORT Command 
An Architectural Overview of UNIX Network Security

How to hold onto root once you have it 
Securing NIS
Securing X Windows 
Improving X-Windows security 
A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers. 
COPS and Robbers: UN*X System Security 
Protection of TCP/IP Based Network Elements 
Scanning for RPC Services 
LOKI2 - information-tunneling program and description.
File Descriptor Hijacking 
File Descriptor Hijacking 
Programming UNIX Sockets in C - Frequently Asked Questions 
This FAQ deals with some suggestions for securing your Unix machine after it has already been compromised. 
Description of hijacking 
How to Set up a Secure Anonymous FTP Site 
Improving the Security of Your Site by Breaking Into it 
Improving the security of your UNIX system 

Go to top of page

This page was last updated on 02-Sep-2000 00:03.