This is Info file Security-HOWTO.info, produced by Makeinfo version 1.68 from the input file /tmp/sgmltmp.Security-HOWTO26383.info.2. \input texinfo  Indirect: Security-HOWTO.info-1: 154 Security-HOWTO.info-2: 49628 Security-HOWTO.info-3: 98658  Tag Table: (Indirect) Node: Top154 Node: Introduction1404 Node: New Versions of this Document2159 Node: Feedback2858 Node: Disclaimer3314 Node: Copyright Information4039 Node: Overview5184 Node: Why Do We Need Security?5752 Node: How Secure Is Secure?6903 Node: What Are You Trying to Protect?8426 Node: Developing A Security Policy12302 Node: Means of Securing Your Site13747 Node: Host Security15200 Node: Your Network Security15922 Node: Security Through Obscurity16750 Node: Organization of This Document17511 Node: Physical Security19340 Node: Computer locks20640 Node: BIOS Security21984 Node: Boot Loader Security23441 Node: xlock and vlock24698 Node: Detecting Physical Security Compromises26364 Node: Local Security28451 Node: Creating New Accounts29418 Node: Root Security30649 Node: Files and Filesystem Security34689 Node: Umask Settings40226 Node: File Permissions41404 Node: Integrity Checking with Tripwire `Tripwire'48099 Node: Trojan Horses49628 Node: Password Security and Encryption50852 Node: PGP and Public-Key Cryptography53305 Node: SSL S-HTTP HTTPS and S/MIME55934 Node: Linux x-kernel IPSEC Implementation58349 Node: `ssh' (Secure Shell) and `stelnet'59612 Node: PAM - Pluggable Authentication Modules62039 Node: Cryptographic IP Encapsulation (CIPE)63664 Node: Kerberos65688 Node: Shadow Passwords-67096 Node: "Crack" and "John the Ripper"68169 Node: CFS - Cryptographic File System and TCFS - Transparent Cryptographic File System69389 Node: X11 SVGA and display security70378 Node: X1170706 Node: SVGA72505 Node: GGI (Generic Graphics Interface project)73012 Node: Kernel Security73692 Node: Kernel Compile Options74673 Node: Kernel Devices79377 Node: Network Security81405 Node: Packet Sniffers82299 Node: System services and tcp[lowbar]wrappers83731 Node: Verify Your DNS Information87700 Node: `identd'88227 Node: SATAN ISS and Other Network Scanners89751 Node: Detecting Port scans-91910 Node: `sendmail' `qmail' and MTA's92742 Node: Denial of Service Attacks93658 Node: NFS (Network File System) Security-97149 Node: NIS (Network Information Service) (formerly YP)-98658 Node: Firewalls99981 Node: VPN's - Virtual Private Networks101547 Node: Security Preparation (before you go on-line)102518 Node: Make a Full Backup of Your Machine103255 Node: Choosing a Good Backup Schedule104107 Node: Backup Your RPM or Debian File Database104745 Node: Keep Track of Your System Accounting Data106013 Node: Apply All New System Updates-109106 Node: What To Do During and After a Breakin109808 Node: Security Compromise Underway-110336 Node: Security Compromise has already happened112984 Node: Closing the Hole113515 Node: Assessing the Damage115451 Node: Backups Backups Backups!116695 Node: Tracking Down the Intruder-117737 Node: Security Sources119131 Node: FTP sites119671 Node: Web Sites120239 Node: Mailing Lists121747 Node: Books - Printed Reading Material122585 Node: Glossary123789 Node: Frequently Asked Questions127222 Node: Conclusion132339 Node: Thanks to133076  End Tag Table