Linux Firewalls

Author: Michael Rash
Publisher: No Starch Press
ISBN: 9781593271411
Release Date: 2007
Genre: Computers

Addressing the firewall capabilities of Linux, a handbook for security professionals describes the Netfilter infrastruction in the Linux kernel and explains how to use Netfilter as an intrusion detection system by integrating it with custom open source software and Snort rulesets, discussin such topics as Linux firewall log analysis and policies, passive network authentication and authorization, and more. Original. (Intermediate)

Linux Firewalls

Author: Michael Rash
Publisher: No Starch Press
ISBN: 9781593272289
Release Date: 2007-09-07
Genre: Computers

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: –Passive network authentication and OS fingerprinting –iptables log analysis and policies –Application layer attack detection with the iptables string match extension –Building an iptables ruleset that emulates a Snort ruleset –Port knocking vs. Single Packet Authorization (SPA) –Tools for visualizing iptables logs Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables—along with psad and fwsnort—to detect and even prevent compromises.

Linux iptables Pocket Reference

Author: Gregor N. Purdy
Publisher: "O'Reilly Media, Inc."
ISBN: 1449378986
Release Date: 2004-08-25
Genre: Computers

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered onLinux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

Linux Firewalls

Author: Steve Suehring
Publisher: Addison-Wesley Professional
ISBN: 9780134000190
Release Date: 2015-01-23
Genre: Computers

The Definitive Guide to Building Firewalls with Linux As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security. An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more. Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise. Inside, you’ll find just what you need to Install, configure, and update a Linux firewall running either iptables or nftables Migrate to nftables, or take advantage of the latest iptables enhancements Manage complex multiple firewall configurations Create, debug, and optimize firewall rules Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions Harden systems against port scanning and other attacks Uncover exploits such as rootkits and backdoors with chkrootkit

Backup Recovery

Author: W. Curtis Preston
Publisher: "O'Reilly Media, Inc."
ISBN: 0596555040
Release Date: 2007-01-03
Genre: Computers

Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material. Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. Backup & Recovery then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: Automate the backup of popular databases without a commercial utility Perform bare metal recovery of any popular open systems platform, including your PC or laptop Utilize valuable but often unknown open source backup products Understand the state of commercial backup software, including explanations of CDP and data de-duplication software Access the current state of backup hardware, including Virtual Tape Libraries (VTLs)

Squid Proxy Server 3 1

Author: Kulbir Saini
Publisher: Packt Publishing Ltd
ISBN: 9781849513913
Release Date: 2011-02-21
Genre: Computers

Improve the performance of your network using the caching and access control capabilities of Squid.

Practical Linux Security Cookbook

Author: Tajinder Kalsi
Publisher: Packt Publishing Ltd
ISBN: 9781785285301
Release Date: 2016-04-29
Genre: Computers

Secure your Linux machines and keep them secured with the help of exciting recipes About This Book This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster. More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks Who This Book Is For Practical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily. However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed. Since Linux Security Cookbook follows a practical approach, following the steps is very easy. What You Will Learn Learn about various vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and security and how to securely modify files Explore various ways to authenticate local users while monitoring their activities. Authenticate users remotely and securely copy files on remote systems Review various network security methods including firewalls using iptables and TCP Wrapper Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more Understand Bash vulnerability/security and patch management In Detail With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security. With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems. Style and approach An easy-to-follow cookbook with step-by-step practical recipes covering the various Linux security administration tasks. Each recipe has screenshots, wherever needed, to make understanding more easy.

Optimizing Linux Performance

Author: Phillip G. Ezolt
Publisher: Prentice Hall
ISBN: UOM:39015060836627
Release Date: 2005
Genre: Computers

Readers learn to use Linux's rich set of performance tools to make their applications run better.

Apache Spark Machine Learning Blueprints

Author: Alex Liu
Publisher: Packt Publishing Ltd
ISBN: 9781785887789
Release Date: 2016-05-30
Genre: Computers

Develop a range of cutting-edge machine learning projects with Apache Spark using this actionable guide About This Book Customize Apache Spark and R to fit your analytical needs in customer research, fraud detection, risk analytics, and recommendation engine development Develop a set of practical Machine Learning applications that can be implemented in real-life projects A comprehensive, project-based guide to improve and refine your predictive models for practical implementation Who This Book Is For If you are a data scientist, a data analyst, or an R and SPSS user with a good understanding of machine learning concepts, algorithms, and techniques, then this is the book for you. Some basic understanding of Spark and its core elements and application is required. What You Will Learn Set up Apache Spark for machine learning and discover its impressive processing power Combine Spark and R to unlock detailed business insights essential for decision making Build machine learning systems with Spark that can detect fraud and analyze financial risks Build predictive models focusing on customer scoring and service ranking Build a recommendation systems using SPSS on Apache Spark Tackle parallel computing and find out how it can support your machine learning projects Turn open data and communication data into actionable insights by making use of various forms of machine learning In Detail There's a reason why Apache Spark has become one of the most popular tools in Machine Learning – its ability to handle huge datasets at an impressive speed means you can be much more responsive to the data at your disposal. This book shows you Spark at its very best, demonstrating how to connect it with R and unlock maximum value not only from the tool but also from your data. Packed with a range of project "blueprints" that demonstrate some of the most interesting challenges that Spark can help you tackle, you'll find out how to use Spark notebooks and access, clean, and join different datasets before putting your knowledge into practice with some real-world projects, in which you will see how Spark Machine Learning can help you with everything from fraud detection to analyzing customer attrition. You'll also find out how to build a recommendation engine using Spark's parallel computing powers. Style and approach This book offers a step-by-step approach to setting up Apache Spark, and use other analytical tools with it to process Big Data and build machine learning projects.The initial chapters focus more on the theory aspect of machine learning with Spark, while each of the later chapters focuses on building standalone projects using Spark.

Classic Shell Scripting

Author: Arnold Robbins
Publisher: "O'Reilly Media, Inc."
ISBN: 0596555261
Release Date: 2005-05-16
Genre: Computers

Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.

RHCSA RHCE Red Hat Enterprise Linux 7 Training and Exam Preparation Guide EX200 and EX300 Third Edition

Author: Asghar Ghori
Publisher: Endeavor Technologies Inc.
ISBN: 9781495148200
Release Date: 2015-03-27
Genre: Computers

Highlights: > Updated to the latest version of Red Hat Enterprise Linux 7 > Upated to cover ALL official exam objectives for the RHCSA and RHCE exams based on Red Hat Enterprise Linux 7 > Equally good for self-study and in-class training > Step-by-step exercises to accomplish tasks > Do-It-Yourself challenge labs at the end of each chapter > Concepts explained with diagrams > Commands and options summarized in tables > Exam tips included > FOUR scenario-based sample exams (TWO for RHCSA and TWO for RHCE) > TWENTY-FIVE chapters (THIRTEEN for RHCSA and TWELVE for RHCE) > Separate sections on RHCSA and RHCE RHCSA Section (chapters 1 to 13): covers local and network (automated with kickstart) RHEL7 installations, general Linux concepts and basic tools, compression and archiving, text file editing, file manipulation and security, processes and task scheduling, bash shell features, software package administration, yum repository configuration, host virtualization, virtual machines, system boot, kernel management, system initialization and service management with systemd, local logging, users and groups, LVM and file systems, AutoFS, Swap, ACLs, firewall, SELinux, network interfaces, NTP/LDAP clients, SSH, and TCP Wrappers. RHCE Section (chapters 14 to 25): covers shell scripting, interface bonding and teaming, IPv6 and routing configuration, NTP, firewalld, Kerberos authentication, kernel tuning, resource utilization reporting, network logging, block storage sharing with iSCSI, file sharing with NFS and Samba/CIFS, HTTP/HTTPS web servers and virtual hosting, Postfix mail SMTP, DNS, and MariaDB. Each chapter lists major topics and relevant exam objectives in the beginning and ends with a summary followed by review questions/answers and Do-It-Yourself challenge labs.

Instant Buildroot

Author: Daniel Manchón
Publisher: Packt Publishing Ltd
ISBN: 9781783289462
Release Date: 2013-09-25
Genre: Computers

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. A concise guide full of step-by-step recipes to help you learn how to generate and configure an embedded Linux system using Buildroot.Instant Buildroot is for developers who want to know how to use Buildroot tools to generate and configure their own embedded system. It is assumed that the reader has some experience with Linux and basic programming and is familiar with basic hardware development boards.

The Hacker s Handbook

Author: Susan Young
Publisher: CRC Press
ISBN: 0203490045
Release Date: 2003-11-24
Genre: Computers

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.