This part of the book is about the ways in which individual
UNIX computers communicate with one another and with the outside
world, and the ways that these systems can be subverted by attackers
to break into your computer system. Because many attacks come from
the outside, this chapter is vital reading for anyone whose computer
has outside connections.
how modems work and provides step-by-step instructions for testing
your computer's modems to see if they harbor potential
, is about the UNIX-to-UNIX copy system, which
can use standard phone lines to copy files, transfer electronic
mail, and exchange news. This chapter explains how UUCP works and
tells you how to make sure that it can't be subverted to
damage your system.
, provides background
on how TCP/IP networking programs work and describes the
security problems they pose.
, discusses the common
IP network services found on UNIX systems, coupled with common problems
, describes some of the issues involved
in running a WWW server without opening your system to security
problems. The issues discussed here should also be borne in mind
when operating any other kind of network-based information server.
RPC, NIS, NIS+, and Kerberos
, discusses a
variety of network information services. It covers some of how they
work, and common pitfalls.
, describes how Sun Microsystems'
Network Filesystem works and its potential security problems.