Linux Learn Tips and Tricks - Page 15
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
lsof is a tool to list all the open files on the system. From this information, processes creating network sockets can be found, among other things.
"The Bastille Hardening System attempts to 'harden' or 'tighten' Unix operating systems. It currently supports the Red Hat, Debian, Mandrake, SuSE and TurboLinux Linux distributions along with HP-UX and Mac OS X."
Just as VMware allows us to run a machine within a machine, UML lets us do run multiple, separate, isolated instances of Linux on a single Linux box.
This paper describes step by step how to build a virtual Honeynet using free and OpenSource solutions. If you have ever wanted to work with Honeynet technologies, but could not afford the investment in multiple computers, now is your chance to try i
This HOWTO details creating accounts on a *nix operating system that are chroot'ed to their home directory.
This article outlines the process of reverse engineering hostile code.
This article tells how it is possible for the user to input format string that will gives us reading on the stack.
This tutorial will let you know what a buffer overflow is and how you can detect if some program is vulnerable to buffer overflow exploits. This tutorial has C source code, so if you don't know C you can have some problems in this tutorial, you also
Procedures and information on CSS and how to prevent your site from being vulnerable.
This article is the first in a series about using lire to analyze log files of internet server applications. This is not limited to one service, e.g. Apache, but is an integrated analyzer for many different services. Included are DNS, WWW and email.
This documentation discusses different phases of systems penetration techniques against Windows and Unix based systems.
This documentation tries to explain the idea and analyses the tricks and limitations of format string exploits. As a real world example, the University of Washington implementation of a ftp server for Unix - wu-ftp version 2.6.0 - as provided on Red
This document discusses minimal features that will allow you to make your Linux Box a "Fortress".
This document discusses the process of how one can recover deleted files in a Linux System.
A problem has recently been identified that can be found on a wide variety of web sites: what you receive from a web site may not be what that site meant to send. If you click on a specially designed link, the site may unknowingly send you bad data,
The O'Reilly Using Samba book is online, and a great resource for information on Samba security.
Here's a document that discusses the pro's and con's of using a chroot jail to restrict access to a part of a filesystem.
The purpose of this FAQ is to give you a general introduction to the topics covered in alt.2600 and #hack. General information on hacking, telephony, cellular communications, security resources, and a description of what alt.2600 actually is.