This part of the book is about the ways in which individual
UNIX computers communicate with one another and with the outside
world, and the ways that these systems can be subverted by attackers
to break into your computer system. Because many attacks come from
the outside, this chapter is vital reading for anyone whose computer
has outside connections.
-
Chapter 14,
Telephone Security
, describes
how modems work and provides step-by-step instructions for testing
your computer's modems to see if they harbor potential
security problems.
-
Chapter 15,
UUCP
, is about the UNIX-to-UNIX copy system, which
can use standard phone lines to copy files, transfer electronic
mail, and exchange news. This chapter explains how UUCP works and
tells you how to make sure that it can't be subverted to
damage your system.
-
Chapter 16,
TCP/IP Networks
, provides background
on how TCP/IP networking programs work and describes the
security problems they pose.
-
Chapter 17,
TCP/IP Services
, discusses the common
IP network services found on UNIX systems, coupled with common problems
and pitfalls.
-
Chapter 18,
WWW Security
, describes some of the issues involved
in running a WWW server without opening your system to security
problems. The issues discussed here should also be borne in mind
when operating any other kind of network-based information server.
-
Chapter 19,
RPC, NIS, NIS+, and Kerberos
, discusses a
variety of network information services. It covers some of how they
work, and common pitfalls.
-
Chapter 20,
NFS
, describes how Sun Microsystems'
Network Filesystem works and its potential security problems.
|
|