Results 1 to 3 of 3

Thread: Hacker Linux Uncovered

  1. #1
    Jedi Global Moderator akira's Avatar
    Join Date
    Nov 2006
    Posts
    538


    <div align="center"></div>


    Book Description:

    Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.

    Link:

    **Hidden Content: To see this hidden content your post count must be 20 or greater.**
    " I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image."

    —Stephen Hawking




  2. #2


    Red face

    Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.

    CITEC File Hosting
    **Hidden Content: To see this hidden content your post count must be 5 or greater.**
    [color=deeppink][b][SIZE=2]“เมื่อดวงใจมีรัก ดั่งเจ้านกโผบิน บินไปไกลแสนไกล
    หัวใจฉันก็ลอยลับไป ถึงแดนดินถิ่นใดนะใจ โอ้ดวงใจเจ้าเอ๋ย*~”[/color][/b][/SIZE]

  3. #3
    Jedi Global Moderator blackkitty's Avatar
    Join Date
    Aug 2007
    Location
    HY .. TANK.ADM..
    Posts
    216


    ช่วย ดูหน่อยนะ ครับ ว่า โพส ซ้ำกัน หรือ ป่าว ให้ดี ยังไง ลอง Search ซักนิดซักหน่อย จะดีครับผม อีกอย่างกรุณาตรวจสอบห้อง ด้วย ครับ http://citecclub.org/forum/index.php?act=Search&f=6

    <div align="left"> </div>

    สันติภาพจงสู่ปักษ์ใต้ของเรา.. สันติสุขจงสู่แผ่นดินของเรา</div>
    <div align="center">...............................................................................................................................................................</div>
    <div align="center"></div>

Similar Threads

  1. Hacker Debugging Uncovered (Uncovered series)
    By blackkitty in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 14-08-2008, 02:53 PM
  2. Hacker Web Exploitation Uncovered
    By natchanon in forum World Hacking Ebook
    Replies: 0
    Last Post: 17-12-2007, 12:10 PM
  3. Cybercrime: Uncovered
    By newsbot in forum World Hacking/Security News
    Replies: 0
    Last Post: 10-12-2007, 04:59 PM
  4. Hacker Disassembling Uncovered
    By akira in forum Hacking/Cracking's E-book
    Replies: 0
    Last Post: 21-10-2007, 03:04 AM
  5. Replies: 5
    Last Post: 26-08-2007, 08:10 AM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •