• Complain

Martin Freiss - Protecting Networks with SATAN

Here you can read online Martin Freiss - Protecting Networks with SATAN full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 1998, publisher: OReilly Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Protecting Networks with SATAN
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    1998
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Protecting Networks with SATAN: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Protecting Networks with SATAN" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

SATAN (Security Administrators Tool for Analyzing Networks) is a powerful aid for system administrators. It performs security audits, scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of software because it uses the Web as its front end.Readers should be particularly interested in SATAN because it has earned a lot of publicity -- even notoriety. The original SATAN paper reported details, for the first time outside the hacker community, on how insecure some often-used services on the Internet really are. The SATAN software provided a tool for automatic detection of such vulnerabilities. Because SATAN could be run on other sites, not only your own, many critics predicted that SATAN would wreak destruction on the Internet. The Oakland Tribune, for example, wrote: Its like randomly mailing automatic rifles to 5000 addresses. I hope some crazy teen doesnt get a hold of one. The dire results predicted have not come to pass, and SATAN has become a useful tool in many system administrators toolboxes.This small book describes not only how to install and use SATAN, but also how to extend its modular structure to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.This book also discusses how you can defend your site against potential abuse by SATAN. You can configure the program to detect when a potential intruder employs the program against your host and network, and you can take appropriate measures to repel the attacks.

Martin Freiss: author's other books


Who wrote Protecting Networks with SATAN? Find out the surname, the name of the author of the book and a list of all author's works by series.

Protecting Networks with SATAN — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Protecting Networks with SATAN" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Page iii Protecting Networks with SATAN Martin Freiss translated by - photo 1
Page iii
Protecting Networks with SATAN
Martin Freiss
translated by Robert Bach
O'REILLYTM
BeijingCambridgeKln Paris Sebastopol Taipei Tokyo

title:
author:
publisher:
isbn10 | asin:
print isbn13:
ebook isbn13:
language:
subject
publication date:
lcc:
ddc:
subject:
Page iv
Protecting Networks with SATAN
by Martin Freiss
Translated by Robert Bach
Copyright 1997 O'Reilly/International Thomson Verlag GmbH & Co KG. English translation Copyright 1998 O'Reilly & Associates, Inc. All rights reserved. Printed in the United States of America.
Published by O'Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
Editor: Elke Hansel
English Language Editor: Gigi Estabrook
Production Editor: Clairemarie Fisher O'Leary
Printing History:
August 1997:First Edition.
May 1998:First English Edition.

The association between the image of a helmet and the topic of SATAN is a trademark of O'Reilly & Associates, Inc.
Nutshell Handbook and the Nutshell Handbook logo are registered trademarks and The JavaTM Series is a trademark of O'Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps.
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
Protecting Networks with SATAN - image 2
This book is printed on acid-free paper with 85% recycled content, 15% post-consumer waste. O'Reilly & Associates is committed to using paper with the highest recycled content available consistent with high quality.
ISBN: 1-56592-425-8
[10/98]
Page v
Table of Contents
Foreword
vii
Preface
ix
1. Security
1
Picture 3
What Is Security, Anyway?
1
Picture 4
Why Network Security?
2
Picture 5
A Network Security Audit
3
2. Installing SATAN
9
Picture 6
Where to Get SATAN
9
Picture 7
System Requirements
10
Picture 8
Compiling and Installing SATAN
11
Picture 9
Repent!
15
Picture 10
Running SATAN Under Linux
16
Picture 11
Things That Might Go Wrong
17
3. Security Audits.
19
Picture 12
The Control Panel
19
Picture 13
Data Management
21
Picture 14
Configuring SATAN.
21
Picture 15
Selecting and Scanning a Target
28
Picture 16
Analyzing the Scan Results
31
4. Scan Results and Countermeasures
35
Picture 17
What SATAN Tests
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Protecting Networks with SATAN»

Look at similar books to Protecting Networks with SATAN. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Protecting Networks with SATAN»

Discussion, reviews of the book Protecting Networks with SATAN and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.