The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]

Почитать бы про программирование, да это взять ?


<< Предыдущая ИНДЕКС Поиск в статьях src Установить закладку Перейти на закладку Следующая >>
_ RU.UNIX (2:5077/15.22) _____________________________________________ RU.UNIX _
 From : Konstantin Kolomiychuke             2:463/147       Mon 22 Sep 97 10:40 
 Subj : Re: Почитать бы про программирование, да это взять ?                    
________________________________________________________________________________
*** Answering a msg posted in area PERS_KK (Personal Echomail for KK).

Hello Dmitry!

Wednesday September 17 1997 16:49, Dmitry the Zuryanovich wrote to Vadim
Kostoglodoff:

 DtZ> Пpо fork() пpоцитиpyйте, пожалyйста. И пpо ioctl с termio.
Загляни на http://www.immsp.kiev.ua/~kk/books/unix


 DtZ> Чао!                http://mir.glas.apc.org/~dz/730.html      /73!O! B

Sincerely yours, Konstantin <kk@immsp.kiev.ua>.

--- GoldED 2.50+
 * Origin: Logic Beauty $ Mail only station (2:463/147)

_ RU.LINUX (2:5077/15.22) ___________________________________________ RU.LINUX _
 From : Alexey Mahotkin                     2:5020/433      22 Oct 97  05:14:32 
 Subj : Нарыл две книжки про безопасность                                       
________________________________________________________________________________
hail

Вот нарыл две книжки про безопасность. Одна старенькая, 1990 года, но, по-моему,
бегает и резвится как котенок.

Вторая -- оранжевая книга министерства обороны.

Обе доступны для фрека с 2:5020/433 00:00-08:00-ZMH и вскорости с
ftp://ftp.nf.ru/pub/techlib под нижеизложенными именами

=== Cut ===
******************************************************************************
*                          Area: Documentation: UNIX
******************************************************************************
ITSOYUS  ARJ    46408  22.10.97   5:12 "Improving The Security Of Your UNIX
                                       System"
ORANGEBK ARJ    75256  22.10.97   5:13 Orange Book: TRUSTED COMPUTER SYSTEM
                                       EVALUATION CRITERIA
UNIXARCH ZIP   449641  30.09.97   0:02 Морис Дж. Бах "Архитектура ОС UNIX"
                                       [Rus]
UNIXTUT  ZIP    41517  13.11.96   4:15 UNIX Tutorial [Rus]
UNIX_FAQ ARJ    48387  23.04.97  14:26 UNIX F.A.Q.
=== Cut ===

Вот содержание первой. Скажите, стоит ли на нее тратить время?
=== Cut here ===
          1       INTRODUCTION...........................................  1
          1.1     UNIX Security..........................................  1
          1.2     The Internet Worm......................................  2
          1.3     Spies and Espionage....................................  3
          1.4     Other Break-Ins........................................  4
          1.5     Security is Important..................................  4

          2       IMPROVING SECURITY.....................................  5
          2.1     Account Security.......................................  5
          2.1.1   Passwords..............................................  5
          2.1.1.1 Selecting Passwords....................................  6
          2.1.1.2 Password Policies......................................  8
          2.1.1.3 Checking Password Security.............................  8
          2.1.2   Expiration Dates.......................................  9
          2.1.3   Guest Accounts......................................... 10
          2.1.4   Accounts Without Passwords............................. 10
          2.1.5   Group Accounts and Groups.............................. 10
          2.1.6   Yellow Pages........................................... 11
          2.2     Network Security....................................... 12
          2.2.1   Trusted Hosts.......................................... 13
          2.2.1.1 The hosts.equiv File................................... 13
          2.2.1.2 The .rhosts File....................................... 14
          2.2.2   Secure Terminals....................................... 15
          2.2.3   The Network File System................................ 16
          2.2.3.1 The exports File....................................... 16
          2.2.3.2 The netgroup File...................................... 17
          2.2.3.3 Restricting Super-User Access.......................... 18
          2.2.4   FTP.................................................... 19
          2.2.4.1 Trivial FTP............................................ 20
          2.2.5   Mail................................................... 21
          2.2.6   Finger................................................. 22
          2.2.7   Modems and Terminal Servers............................ 23
          2.2.8   Firewalls.............................................. 23
          2.3     File System Security................................... 24
          2.3.1   Setuid Shell Scripts................................... 25
          2.3.2   The Sticky Bit on Directories.......................... 26
          2.3.3   The Setgid Bit on Directories.......................... 26
          2.3.4   The umask Value........................................ 27
          2.3.5   Encrypting Files....................................... 27
          2.3.6   Devices................................................ 28
          2.4     Security Is Your Responsibility........................ 29

          3       MONITORING SECURITY.................................... 31
          3.1     Account Security....................................... 31
          3.1.1   The lastlog File....................................... 31
          3.1.2   The utmp and wtmp Files................................ 31
          3.1.3   The acct File.......................................... 33
          3.2     Network Security....................................... 34
          3.2.1   The syslog Facility.................................... 34
          3.2.2   The showmount Command.................................. 35
          3.3     File System Security................................... 35
          3.3.1   The find Command....................................... 36
          3.3.1.1 Finding Setuid and Setgid Files........................ 36
          3.3.1.2 Finding World-Writable Files........................... 38
          3.3.1.3 Finding Unowned Files.................................. 38
          3.3.1.4 Finding .rhosts Files.................................. 39
          3.3.2   Checklists............................................. 39
          3.3.3   Backups................................................ 40
          3.4     Know Your System....................................... 41
          3.4.1   The ps Command......................................... 41
          3.4.2   The who and w Commands................................. 42
          3.4.3   The ls Command......................................... 42
          3.5     Keep Your Eyes Open.................................... 42

          4       SOFTWARE FOR IMPROVING SECURITY........................ 45
          4.1     Obtaining Fixes and New Versions....................... 45
          4.1.1   Sun Fixes on UUNET..................................... 45
          4.1.2   Berkeley Fixes......................................... 46
          4.1.3   Simtel-20 and UUNET.................................... 47
          4.1.4   Vendors................................................ 47
          4.2     The npasswd Command.................................... 48
          4.3     The COPS Package....................................... 48
          4.4     Sun C2 Security Features............................... 49
          4.5     Kerberos............................................... 50

          5       KEEPING ABREAST OF THE BUGS............................ 51
          5.1     The Computer Emergency Response Team................... 51
          5.2     DDN Management Bulletins............................... 51
          5.3     Security-Related Mailing Lists......................... 52
          5.3.1   Security............................................... 52
          5.3.2   RISKS.................................................. 52
          5.3.3   TCP-IP................................................. 53
          5.3.4   SUN-SPOTS, SUN-NETS, SUN-MANAGERS...................... 53
          5.3.5   VIRUS-L................................................ 53

          6       SUGGESTED READING...................................... 55

          7       CONCLUSIONS............................................ 57

          REFERENCES..................................................... 59

          APPENDIX A - SECURITY CHECKLIST................................ 63
=== Cut here ===

Пусть тени обходят тебя стороной       // carnage of time

* Crossposted in RU.LINUX
* Crossposted in RU.BOOKS.COMPUTING

... But from the forest and the field - here she comes - here she comes
--- GoldED/386 3.00.Alpha5+
 * Origin: One of the SouBa group stations // HPG (2:5020/433)

_ RU.LINUX (2:5077/15.22) ___________________________________________ RU.LINUX _
 From : Alexei Serebryakov                  2:5034/1        30 Jun 98  12:09:52 
 Subj : Re: Социологический опрос                                               
________________________________________________________________________________
Hi All!

In fido7.ru.linux Ivan Vanin <Ivan.Vanin@p17.f439.n5030.z2.fidonet.org> wrote:
>> 29 Jun 98 20:16, Artem Chuprina wrote to Ivan Vanin:
>>  AC> Забей, да? Покупай оригиналы. Hешто в 5030 никто не завозит книжки
>>  AC> О'Рылли? Да, в среднем $50 штука. А кому легко?

> Hе, для меня пока уж слишком обременительно. :) Тут раздумываю, может
попробую

Многие из сих книжек лежат на http://www.mcp.com/personal/
Приятно оформлены. :)

-- 
Alexei Serebryakov
Postmaster of Kostroma State Agricultural Academy
E-mail: admin@ksaa.kostroma.su
--- TIN [UNIX 1.3 unoff BETA release 960917]
 * Origin: Kostroma State Agricultural Academy. (2:5034/1@fidonet)



<< Предыдущая ИНДЕКС Поиск в статьях src Установить закладку Перейти на закладку Следующая >>

 Добавить комментарий
Имя:
E-Mail:
Заголовок:
Текст:




Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру