Systems Administration - Start Page
MUST HAVE
- Security Links
- Linux Shortcuts and reference
- Ugrading the Linux Kernel
- Basic Linux Firewall Configuration
- Network-Related References here
- Controlling Access to Services on your Server: here
- TCPWrappers: here
- TCP Wrappers here
- OpenSSH here
- System Configuration here
- Gnome-RPM Package Management: here
- Package Management: here
- Getting Started with Gnu Privacy Guard here
- Network File System (NFS) here
- Kerberos
- HOW TO: Recovering from rootkit attacks.
- Information on RAID: here
- SECURITY
- Linux Security: here
- Recognizing and Recovering from Rootkit Attacks, by David O'Brien, published in Sys Admin 5(11) (November 1996), pp. 8-20.
- CHKROOTKIT
- check-ps, by Duncan Simpson, is a program that is designed to detect rootkit versions of ps that fail to tell you about selected processes.
- Enhancing Security of Unix Systems
- comp.security.unix Newsgroup FAQs
- comp.os.linux.security FAQ
- Linux Security Documentation
- LASG -- Linux Administrators Security Guide
- Linux Security HOWTO
- RESPONSE
- Computer Security Incident Response Team (CSIRT) FAQ
- A Common Language for Computer Security Incidents
- CSIRT Resources (Portuguese and English)
PHP Ten Security Checks
DATABASE
- Upgrading MySQL from 4.1: here
Secure Programming
- Secure Programming for Linux and Unix HOWTO
- Secure Programming
- Secure Unix Programming Checklist
- Secure UNIX Programming FAQ
- Writing secure CGI scripts
- The Software Security Project
- Splint - Secure Programming Lint
- A presentation by Frederic Raynal on secure programming methods
- Secure Programming in PHP
- Selected Articles on Secure Programming
- Books, papers and articles from the appendix of the book "Secure Coding: Principles and Practices"
RFC:
RFC 2828: Internet Security Glossary
RFC 2196: Site Security Handbook
0 Comments:
Post a Comment
<< Home