These classnotes are depreciated. As of 2005, I no longer teach the classes. Notes will remain online for legacy purposes

UNIX03/A Review

Classnotes | UNIX03 | RecentChanges | Preferences

Before we begin, let's have a quick review of what we've covered thus far:
  • We learned of the seven deadly sins, and learned how to close and secure certain key ports and services.
  • We learned about setting SAMBA securely, ACLs under POSIX systems, and the dangers of SWAT.
  • We set up a complete SPAM filtration system as well as a secure Postfix MTA install.
  • We configured Apache securely and set up a SPAM-trap that can act as the basis for web-based cracker traps.
  • We learned of the dangers involved in CGI scripts and server side web applications, and we set up a web-based defacement scanner.
  • We learned of FTP security and how to set up an FTP server chroot'ed.
  • We learned about the three main ways to Firewall your Linux box (or network) including IP Chains, IP Tables, and TCP Wrappers.
  • Finally, we set up an Adaptive Firewall that would grow and evolve in real time as your system is attacked.

Today we will finish up with a look at monitoring an already setup and running system, as well as trapping crackers when they attempt to infiltrate our system. We will also look at how one regains control over a system which has been compromised and at the encryption options available to a Linux system administrator.



Classnotes | UNIX03 | RecentChanges | Preferences
This page is read-only | View other revisions
Last edited October 24, 2003 4:06 pm (diff)
Search:
(C) Copyright 2003 Samuel Hart
Creative Commons License
This work is licensed under a Creative Commons License.