Skip to Main Content
Network Security Hacks
book

Network Security Hacks

by Andrew Lockhart
April 2004
Intermediate to advanced content levelIntermediate to advanced
320 pages
9h 10m
English
O'Reilly Media, Inc.
Content preview from Network Security Hacks

Index

Symbols

! (logical NOT) operator
matching IP addresses and ports for Snort rules, Write Your Own Snort Rules
TCP flag matching, Snort rules, Write Your Own Snort Rules
* operator, TCP flag matching in Snort rules, Write Your Own Snort Rules
+ operator, TCP flag matching in Snort rules, Write Your Own Snort Rules
-> (direction operator), in Snort rules, Write Your Own Snort Rules
-nolisten tcp option for startup commands, Prevent Services from Binding to an Interface
../ character sequence in requests, Detect and Prevent Web Application Intrusions
.rej files, finding, Lock Down Your Kernel with grsecurity
/dev/mem and /dev/kmem, preventing access to, Protect Your Logs from Tampering
/proc directory, restricting access with grsecurity, Lock Down Your Kernel with grsecurity
: (colon), in port ranges for Snort rules, Write Your Own Snort Rules
<> (direction operator), in Snort rules, Write Your Own Snort Rules
| character
enclosing hexadecimal vales in Snort rules, Write Your Own Snort Rules
searching on multiple variables, Detect and Prevent Web Application Intrusions

A

ac command (process accounting), Log User Activity with Process Accounting
Accept header, logging requests without, Detect and Prevent Web Application Intrusions
accept option, SnortSam, Automated Dynamic Firewalling with SnortSam
access.conf file (pam_access module), Control Login Access with PAM
ACID (Analysis Console for Intrusion Databases), Keep Track of Alerts, Keep Track of Alerts
archiving database, configuring, Keep Track of ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux: Powerful Server Administration

Linux: Powerful Server Administration

Uday Sawant, Oliver Pelz, Jonathan Hobson, William Leemans

Publisher Resources

ISBN: 0596006438Catalog PageErrata