Offers real world examples of computer security breeches and discusses common attacks, security policies, configuration and hardware preparation, and system scanning and repair.If the -a flag was given to enable the use of the /etc/ftpaccess configuration file, the guestserver command may be used to specify which hosts someone may initiate an anonymous login from. ... 4.4.1.3 Adding the ftp User and Group. Create ananbsp;...
Title | : | Real World Linux Security |
Author | : | Bob Toxen |
Publisher | : | Prentice Hall Professional - 2003 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: