Linux Security Quick Reference Guide – An awesome security checklist reference
The intent of this Quick Reference Guide is to provide a starting point for improving the security of your system, to serve as a pointer to more in-depth security information, and to increase security awareness and methods that can be used to improve security. It is not a substitute for reading any of the vast amounts of Linux security documentation that already exists.In the ever-changing world of global data communications, inexpensive Internet connections, and fastpaced software development, security is becoming more and more of an issue. Security is now a basic requirement because global computing is inherently insecure. As your data goes from point A to point B
on the Internet, it may pass through several other points along the way, giving other users the opportunity to intercept, and even alter, your data. Even other users on your system may maliciously transform your data into something you did not intend. Unauthorized access to your system may be obtained by intruders, also known as “crackers”, who then use advanced knowledge to impersonate you, steal information from you, or even deny you access to your own resources.
Linux, a Unix-compatible operating system that runs on personal computers and larger servers, is valued above all for its networking strengths. The Linux Network Administrator’s Guide spells out all the information needed for joining a network, whether it’s a simple UUCP connection or a full LAN with a Linux system serving as a firewall, an NFS or NIS file server, and a mail and news hub.This book, which is one of the most successful to come from the Linux Documentation Project and remains freely distributable under its license, touches on all the essential networking software included with the operating system, plus some hardware considerations. Fully updated, the book now covers firewalls, including the use of ipchains and iptables (netfilter), masquerading, and accounting. Other new topics include Novell (NCP/IPX) support and INN (news administration). Original material on serial connections, UUCP, routing and DNS, mail and News, SLIP and PPP, NFS, and NIS has been thoroughly updated. Kernel options reflect the 2.2 kernel. However, some topics covered in other books (notably Samba and web server administration) are not in this book.
I wrote this book originally because no Linux security documentation existed back in the late 1990’s. Since then several Linux security books have been published, but in general they all have shortcomings (for example one of them spends 40 pages on cops, a largely obsolete tool). So anyways I’ve decided it’s time to update the book, which is one major advantage of doing this on the www. Currently it is April 2001, I’m hoping the major rewrite will be done by fall or winter of 2001 and then the LASG can go back into “maintenance” mode for a while
The purpose of this book is to help you discover this distribution. We hope to share the experience that we have gathered since we joined the project as developers and contributors in 1998 (Raphaël) and 2000 (Roland). With any luck, our enthusiasm will be communicative, and maybe you will join us sometime. This book analyze a wide range of issues from the installation and package maintenance to
Self-Service Linux – Mastering the Art of Problem Determination
Linux is the best choice for home and business users. It is very powerful, as stable as any commercial operating system, secure, and best of all, it is open source. One of the biggest deciding factors for whether to use Linux at home or for your business can be service and support.The biggest factor in a company’s decision to go with Linux is overcoming the support issues. This book should be an essential part of every company’s Linux adoption plan to keep the total cost of ownership down and improve the ROI of their Linux strategy. It is also a book that advanced Linux professionals running their own Linux systems will be able to use to troubleshoot. This book gives the staff the basics they need to diagnose most problems that they will face and will go into the nitty-gritty on the toughest problems.
Chapter 1:Best Practices and Initial Investigation
Chapter 2:strace and System Call Tracing Explained
Chapter 3:The /proc Filesystem
Chapter 5:The Stack
Chapter 6:The GNU Debugger (GDB)
Chapter 7:Linux System Crashes and Hangs
Chapter 8:Kernel Debugging with KDB
Chapter 9:ELF: Executable and Linking Format (more…)
Linux 101 Hacks 2nd edition
There are total of 101 hacks in this book that will help you build a strong foundation in Linux. All the hacks in this book are explained with appropriate Linux command examples that are easy to follow.
Linux Firewall Configuration: Packet Filtering and Netfilter/iptables
This document was written purely so people can start to grasp the wonderful world of iptables. It was never meant to contain information on specific security bugs in iptables or Netfilter. If you find peculiar bugs or behaviors in iptables or any of the subcomponents, you should contact the Netfilter mailing lists and tell them about the problem and they can tell you if this is a real bug or if it has already been fixed. There are very rarely actual security related bugs found in iptables or Netfilter, however, one or two do slip by once in a while. These are properly shown on the front page of the Netfilter main page, and that is where you should go to get information on such topics.
Linux Client Migration Cookbook, Version 2: A Practical Planning and Implementation Guide for Migrating to Desktop Linux
The goal of this IBM Redbooks publication is to provide a technical planning reference for IT organizations large or small that are now considering a migration to Linux-based personal computers. For Linux, there is a tremendous amount of “how-to” information available online that addresses specific and very technical operating system configuration issues, platform-specific installation methods, user interface customizations, and so forth. This book includes some technical “how-to” as well, but the overall focus of the content in this book is to walk the reader through some of the important considerations and planning issues that you could encounter during a migration project. Within the context of a pre-existing Microsoft Windows-based environment, we attempt to present a more holistic, end-to-end view of the technical challenges and methods necessary to complete a successful migration to Linux-based clients.
Part 1 Choosing Linux
Chapter 1. Introduction
Chapter 2. The case for migration
Part 2 Planning the pilot migration
Chapter 3. Organizational and human factors planning
Chapter 4. Technical planning
Chapter 5. Linux architecture and technical differences
Part 3 Performing the pilot migration
Chapter 6. Migration best practices
Chapter 7. Client deployment models
Chapter 8. Client migration scenario
Chapter 9. Integration how-tos
Part 4 Appendixes
Appendix A. Linux glossary for Windows users
Appendix B. Using enterprise management tools
Appendix C. Automating desktop migration using Versora Progression Desktop
Appendix D. Multi-station computing deep dive using Userful Desktop Multiplier
Appendix E. Client personalization
Appendix F. Desktop automation and scripting
Appendix G. Application porting
You can search for, view, or download Redbooks, Redpapers, Hints and Tips, draft publications and Additional materials, as well as order hardcopy Redbooks or CD-ROMs, at this Web site: ibm.com/redbooks This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written
Linux IPv6 HOWTO
The goal of the Linux IPv6 HOWTO is to answer both basic and advanced questions about IPv6 on the Linux operating system. This HOWTO will provide the reader with enough information to install, configure, and use IPv6 applications on Linux machines.
Written by a leading developer and maintainer of the Linux kernel, Linux Kernel in a Nutshell is a comprehensive overview of kernel configuration and building, a critical task for Linux users and administrators.Linux Kernel in a Nutshell covers the entire range of kernel tasks, starting with downloading the source and making sure that the kernel is in sync with the versions of the tools you need. In addition to configuration and installation steps, the book offers reference material and discussions of related topics such as control of kernel options at runtime.
Author(s): Greg Kroah-Hartman