Skip to main content

Security

  • Chapter
  • First Online:
Using and Administering Linux: Volume 2
  • 2491 Accesses

Abstract

In this chapter you will learn

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Get Safe Online, www.getsafeonline.org/protecting-yourself/

  2. 2.

    ARP, Address Resolution Protocol, a protocol that enables discovery of the MAC (hardware) address of a network interface on a remote host using the host’s IP address

  3. 3.

    ICMP, Free On-line Dictionary of Computing (FOLDOC), an extension to the Internet Protocol (IP) that allows for the generation of error messages, test packets, and informational messages related to IP. It is defined in STD 5, RFC 792.

  4. 4.

    Ricardo Gerardi, An introduction to using tcpdump at the Linux command line, https://opensource.com/article/18/10/introduction-tcpdump

  5. 5.

    Wikipedia, Virtual Private Network, https://en.wikipedia.org/wiki/Virtual_private_network

  6. 6.

    Wikipedia, netfilter, https://en.wikipedia.org/wiki/netfilter

  7. 7.

    DMZ – A network segment that contains servers that respond to external requests for web pages and so on but in which no data is stored. All data is stored in a more secure network with another set of firewalls between it and the DMZ.

  8. 8.

    Both, David, The Linux Philosophy for SysAdmins, Apress, 2018, 375

  9. 9.

    Both, David, Real SysAdmins don’t sudo – Book excerpt, www.both.org/?p=960

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 David Both

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Both, D. (2020). Security. In: Using and Administering Linux: Volume 2. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5455-4_17

Download citation

Publish with us

Policies and ethics