O'Reilly logo

A Practical Guide to Red Hat® Linux® 8 by Mark G. Sobell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Resources

Many free and commercial programs can enhance system security. Some of these are listed in Table C-1.

Tool What It Does Where to Get It
AIDE Advanced Intrusion Detection Environment. Similar to tripwire with extensible verification algorithms. www.cs.tut.fi/~rammer/aide.html
Argus Audits network transactions. ciac.llnl.gov/ciac/ToolsUnixNetMon.html#Argus
bugtraq A moderated mailing list for the announcement and detailed discussion of all aspects of computer security vulnerabilities. www.securityfocus.com
CERT Computer Emergency Response Team. A repository of papers and data about major security events and a list of security tools. www.cert.org http://www.cert.org/tech_tips/security_tools.html
chkrootkit Checks for signs of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required