i 2 ndex [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · b backdoor...

30
INDEX 2 3 4 5 6 7 8 9 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 519 A ac3dec, 500 Accent, 424 Accounts, root, 11 ack (Snort rule option), 257 Actions, Snort, 252 activate (Snort action), 252 Active reconnaissance, 233 add command (CVS), 123 Aeromail, 158 installation of, 165 using, 171–75 agetty command, 81–82 AIM (AOL Instant Messenger), 54 under wine, 339–40, 345 Albing, Greg, 477 alert (Snort action), 252 AllowUsers (SSH server option), 277 Amplifier, audio, 386 Amplitude-based method for storing digital audio (PCM), 366–67 Analog-to-digital (A-D) conversion, 366 Animation, 461–62 Anthem, 402 Antisniff, 228 Apache, 114, 158, 162, 177, 179–93 API, 182–85 module basics, 180–81 remote monitoring, 185–92 coding, 186–89 compiling, 189–91 testing, 191–92 Apex DVD player, 419–20 API, Apache, 182–85 apxs tool, 189 arch directory, 17 Artistic License, 6 aRts, 407 ASF files, 500, 501 Aspect ratio, 446 Attachments, e-mail, 174 Attacks on networks, 232–34 browser-based, 288 denial-of-service (DoS), 50, 232 “Man in the Middle” (MITM), 269 profiles of, 260 scripted, 234 by sniffing, 217 Audacity waveform editor, 375–77, 380, 387, 413 Audio CDs, burning, 363 Audio processing, 365–97. See also Music production audio files from CD, 372–73 editing (cut and paste), 375–77 format conversions, 380–82 mixer properties, 370–72 recording, 371, 374–75 sound effects and filtering, 377–80 system preparation for, 370 types of digital audio, 366–69 amplitude-based, 366–67 frequency-based, 367, 369, 380–81 MP3 (MPEG Layer 3) format, 368–69, 381 Ogg Vorbis format, 369, 381 RAW format, 368 WAV format, 368 vinyl record transfer to CDs, 384–95 audio system and, 386–87 CD creation, 393–94 MP3 file creation, 394–95 preparation for, 385–86 recording, 387–89 removing clicks, pops, and hisses, 389–90 trimming cuts, 390–93 writing audio to CDs, 382–84 Authentication, RSA/DSA, 285–87 Autoconf, 12–13 AvantGo, 330–31 avifile, 497 avifile-0.53.2, 499–500 AVI files, 483, 497, 498–501 AVI-XMMS-1.2.1, 501 28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 519

Upload: others

Post on 06-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

INDEX23456789

2222222222333333333344444

519

Aac3dec, 500Accent, 424Accounts, root, 11ack (Snort rule option), 257Actions, Snort, 252activate (Snort action), 252Active reconnaissance, 233add command (CVS), 123Aeromail, 158

installation of, 165using, 171–75

agetty command, 81–82AIM (AOL Instant Messenger),

54under wine, 339–40, 345

Albing, Greg, 477alert (Snort action), 252AllowUsers (SSH server option),

277Amplifier, audio, 386Amplitude-based method for

storing digital audio(PCM), 366–67

Analog-to-digital (A-D)conversion, 366

Animation, 461–62Anthem, 402Antisniff, 228Apache, 114, 158, 162, 177,

179–93API, 182–85module basics, 180–81

remote monitoring, 185–92coding, 186–89compiling, 189–91testing, 191–92

Apex DVD player, 419–20API, Apache, 182–85apxs tool, 189arch directory, 17Artistic License, 6aRts, 407ASF files, 500, 501Aspect ratio, 446Attachments, e-mail, 174Attacks on networks, 232–34

browser-based, 288denial-of-service (DoS), 50,

232“Man in the Middle” (MITM),

269profiles of, 260scripted, 234by sniffing, 217

Audacity waveform editor,375–77, 380, 387, 413

Audio CDs, burning, 363Audio processing, 365–97. See

also Music productionaudio files from CD, 372–73editing (cut and paste),

375–77format conversions, 380–82mixer properties, 370–72recording, 371, 374–75

sound effects and filtering,377–80

system preparation for, 370types of digital audio, 366–69

amplitude-based, 366–67frequency-based, 367, 369,

380–81MP3 (MPEG Layer 3)

format, 368–69, 381Ogg Vorbis format, 369,

381RAW format, 368WAV format, 368

vinyl record transfer to CDs,384–95

audio system and, 386–87CD creation, 393–94MP3 file creation, 394–95preparation for, 385–86recording, 387–89removing clicks, pops, and

hisses, 389–90trimming cuts, 390–93

writing audio to CDs, 382–84

Authentication, RSA/DSA,285–87

Autoconf, 12–13AvantGo, 330–31avifile, 497avifile-0.53.2, 499–500AVI files, 483, 497, 498–501AVI-XMMS-1.2.1, 501

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 519

Page 2: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

BBackdoor software, 54backup switch (pilot-xfer), 310,

312–13BacteriuM, 407bash, 298Berkeley DB, 220Berkeley Software Distribution

(BSD) licenses, 6BIOS, 14Bit depth, 366Bit rate, 368–69Blackbox, 302BlackICE, 222bladeenc, 381Blender, 459, 460, 461, 475, 476BMP, 444Bootable CDs, 363/boot directory, 15Booting the kernel, 22–23Boot loader, LILO, 13–15Boot sector viruses, 14Bourne-again shell (bash), 298Brahms, 402, 406Broadcast 2000, 494Browser-based attacks, 288Browsers

network, 96–98Web, 185–92

BSD licenses, 6BTTV chip set, 486Buffer underruns, 353Building blocks (primitives), 469b[un]zip2, 296Burn All GIFs Web site, 441bzImage kernel, 21bzip, 21

CCable modems, 48Cable providers, 46Cables, two-way printer port,

63–64Cameras

digital, 447–48positioning, 468video, 484

Capital cost of softwaredistribution, 507

Capture, video, 484, 487–88,492–93

Cathedral and the Bazaar, The, 7CCD, 447cdda2wav, 352–53cdparanoia, 372–73cdrdao, 382–83cdrecord, 352–53, 356, 358,

382–83, 393–94CDs

audio, 363files from, 372–73MP3 on, 418writing, 382–84

remote burning of, 347–63audio CDs, 363blanking CD-RW, 355–58bootable CDs, 363burning data, 358–59duplicating CDs, 359–6280-min/700 mb CDs, 363finding drive, 355iso images, 353–55kernel modification for,

348–52mkisofs, 352, 354using GUID for, 359–61verifying, 359, 363

video (VCDs), 504–5vinyl record transfer to,

384–95audio system and, 386–87CD creation, 393–94MP3 file creation, 394–95preparation for, 385–86recording to hard disk,

387–89removing clicks, pops, and

hisses, 389–90trimming tracks, 390–93

Censorware, 223Certificates, 163

on Netscape, 166–70Change-coupled device (CCD),

447

checkout command (CVS), 122Chorus sound effect, 380Client-server configuration

for NAT, 72–74for PLIP networking, 70–71

Client/server model, CVS, 120

Clipping, 370–72Close-up, 32COAST project, 236Codecs

audio, 369video, 483, 487, 500

Color balance, 453Colors, in PovRay, 466, 473–75Comer, Douglas E., 73Command line, 2Commercial music, 497commit command (CVS), 122Communications, 59–84.

See also Network(s)/networking; Secureconnectivity

non-IP dialup, 74–84/etc/inittab file, 77–80getty, 76–77, 81–84

Parallel Line InternetProtocol (PLIP)networking, 60–71

kernel compilation toenable, 64–69

NAT set up for, 71–74PLIP tunnel set up, 69–71

Compiling, 8–10autoconf, 12–13as encryption, 507Imakefiles, 11make files, 11–12

Compressionin JPEG, 441–43LZW, 440–41

Compression/decompressionprogram, 296

CompressionLevel (SSH clientoption), 275

Compression (SSH clientoption), 275

520 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 520

Page 3: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

Concurrent Versioning System.See CVS (ConcurrentVersioning System)

Configuration system,interactive, 18–20

Connectivity, secure. See Secureconnectivity

Console-based applicationse-mail-based, 133–55

connecting, 134–35e-mail concepts, 136–37Fetchmail, 136, 137–39Procmail, 134–35, 139–40,

147security issues, 135–36,

147–54MP3 player, 417–18

Consoles, text-mode, 76–77content-list (Snort rule option),

257content (Snort rule option),

256–57convert command

(ImageMagick), 445–46CPU requirement, 26crontab, 138–39Cryptographic basics, 196–98Crystal Space, 462, 475, 476CuBase VST, 402Cumulus, 407cut, 297CVS (Concurrent Versioning

System), 118, 120–28, 296commands, 121–23conflict resolution, 123–28core concepts, 120repository, 120–21

CVSROOT, 121Cygwin, 29

DData Encryption Standard

(DES), 196Datagrams, fragmented, 72–73Data-harvesting. See SniffingDCT, 442–43, 444dd, 295, 390–92

Debian, 26integrity checks by, 241–46VNC on, 40Web server implementation,

115Debian Free Software Guidelines

(DFSG), 7, 8Delay sound effect, 380delete switch (pilot-xfer), 311Demos, music, 408–9Denial-of-service (DoS) attack,

50, 232DenyUsers (SSH server

option), 277dep, 20–21Dia, 303Dialect, 424Dialup, non-IP, 74–84

/etc/inittab file, 77–80getty, 76–77, 81–84

Dictionariesphoneme, 427pronunciation, 426, 427

diff, 295Digital audio. See Audio

processingDigital cameras, 447–48Digital signatures, 135, 148,

203–6, 235. See alsoGPG (GNU PrivacyGuard)

encryption without, 210–11hashing functions for, 197passphrases and, 208validating, 204–6

direction, Snort, 254Directory Directives, 164DirectX, 345Discrete cosine transform

(DCT), 442–43, 444Display specification, 31distributed.net client, 53DivX, 483Documentation directory, 17Domain Naming System (DNS),

54, 253dpi (dots per inch), 438

Driver(s)interrupt, 69polling, 69video, 486

drivers directory, 17Drives, mapping, 99–100Drum machines, 407–8dsize (Snort rule option), 256DSL, 48dsniff, 218–23

compiling, 221–23required packages, 218–21

DUMB, 462Duplication of CDs, 359–62DVD players, 419–20Dynamic loading, 180dynamic (Snort action), 252

Eecasound, 413Echo sound effect, 380ECP, 63Editing

audio, 375–77video, 488, 493–97

Editors, 295waveform, 375–77, 380, 387,

413elm, 301

GPG integration with, 211ELM jukebox, 431E-mail

concepts, 136–37programs and utilities, 301–2security issues. See GPG

(GNU Privacy Guard)speech-driven checking at

login, 428–31tunneling through, 291video (V-mails), 505

E-mail-based consoleapplication, 133–55

connecting, 134–35Fetchmail, 136, 137–39, 301Procmail, 134–35, 139–46, 147

command execution, 147recipes in, 140–46

23456789

2222222222333333333344444

INDEX 521

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 521

Page 4: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

E-mail-based consoleapplication (cont.)

security issues, 135–36,147–54

GnuPG to encrypt results,148

GnuPG to handleauthorizations, 147–48

E-mail clients, GPG integratedwith, 211–13

E-mail servers, 287Employee watching with HTTP

proxy, 288Emulators, 333Encapsulation, in JPEG

encoding, 443Encryption, 135, 196–98, 270.

See also GPG (GNUPrivacy Guard)

compilation as, 507passphrases for decryption,

209–10public key, 197–98, 268–70without signature, 210–11

Endianness, 368Enhanced capability port (ECP),

63Entrenchment phase of network-

based attack, 234Entropy pool, 201EPP (enhanced parallel port),

62–63EPS (Encapsulated PostScript),

441Equalizer, graphic, 378–80/etc/group file, 116/etc/inittab file, 77–80/etc/lilo.conf file, 14–15/etc/tripwire/tw.config file, 236Ethereal, 225–26, 227–28Ethernet card in promiscuous

mode, 216Ethernet networks, nonswitched,

216exclude switch (pilot-xfer), 311Exim, 136

ext, 121Extreme Wave, 460, 475

FFalse positives in Snort,

261–62Festival, 424, 426–28, 431Fetchmail, 134, 136, 137–39, 301.fetchmailrc file, 137, 140fetch switch (pilot-xfer), 311File browser, speech-driven,

431–36File management tools, 294–98file (program), 297Files, comparing, 295File Transfer Protocol. See FTPFile transfer with SCP, 270–71Filtering

frequency, 377, 378–80in Procmail, 141–42

Filters, spam, 141find, 299Finding, tools for, 299–300Firewall(s), 265

getting out of, 279–82getting through, 283–85hardware, 58http-proxy-only, 289IP, 49IP address of, 52maniacally restrictive, 285network, 49port forwarding by, 54–56rules, 73secure connections to, 53telecommuting through,

273–74tunneling through, 273–74

flags (Snort rule option), 256Flowcharting, 303Folder management on IMAP,

172–74Forte Agent, 345.forward file, 147Forwarding OpenSSH server,

284

ForwardX11 (SSH client option),275

Fourier, Jean Baptiste Joseph,367

fragbits (Snort rule option), 256Frame grabbers, 484Fraunhofer Group, 369“Free,” defining, 3–8FreeAmp, 371, 382, 417–20Freebirth, 407Free Software, 3, 508–9

licenses for, 4–7philosophy behind, 7

Great Schism in, 7–8Free Software Foundation

(FSF), 4Frequency-based method of

storing audio, 367, 369,380–81

Frequency filtering, 377, 378–80Freshmeat Web site, 24fs directory, 17fstab configuration file, 295FTP, 53, 54, 267, 268

encrypted, 268masquerading of, 72

Gg3d, 460, 475gAlan, 407Game engines, 3D, 462Game hosting, 56–57GatewayPorts (SSH client

option), 275GatewayPorts (SSH server

option), 277–78gcc (GNU C compiler), 5–6getty, 76–77

setting up, 81–84Ghostscript package, 88Gibbon, Edward, 507GIMP (GNU Image Manipula-

tion Program), 303, 445,451–53, 454

Giram, 460, 475GNOME, 302

522 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 522

Page 5: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

GNU Lilypond, 406GnuPG, 135

authorizations handling by,147–48

encryption with, 148gpg4pine program, 212GPG (GNU Privacy Guard),

195–213cryptographic basics, 196–98encrypting files using, 202–3,

206–10integrating with e-mail clients,

211–13key generation, 198–202key-signing and trust levels in,

206private and public keys in,

196–98signing files using, 202–10unsigned, encrypted messages,

210–11gphoto package, 447–48GPL (GNU Public License),

4–5Graphic equalizer, 378–80Graphics file viewer, 303Green Box, 407grep, 299gSculpt, 460, 475Gseq, 402gserver, 121GTK-1.2, 225GUI tools, 302–3

for CD burning, 359–61pilot-manager, 317–20

g[un]zip, 296

HHandler functions, 187Handshaking, 62Handspring Visor, 308–9Hard disk recorders, multitrack,

412–13Hard disk requirement, 26Hardware requirements, 25–26Hashing algorithm, 197

hdrbench, 413Heads (monitor), 31Help, getting, 300–301Hewlett-Packard, 63High Color, 439Histogram, 451–52Home networks, 262–63Homepage, undernet, 128–30Host (SSH client option), 275HTC program, 289–91HTS program, 289HTTP, forwarding traffic, 56HTTP headers, 184HTTP proxy servers, 287–88httptunnel, 289–91Human capital of software

development, 507–8

IIANAL declaration, 4IBM, 216icmp_id (Snort rule option),

257ICMP (Internet Control

Message Protocol), 291ICMP Masquerading, 49icode (Snort rule option), 257IDE-SCSI emulation, 384id (Snort rule option), 254IEEE 1284 Extended

Capabilities PortProtocol, 63

ifconfig, 70–71ImageMagick, 445–46Image resolution, 438Imakefiles, 11imapd service, 160IMAP (Internet Message

Access Protocol) server,159–60

folder management on,172–74

IMP, 176import command (CVS), 122include directory, 17index.html, 115

inetd, 106info, 301init directory, 17Innovation3D, 460, 475Inodes, 238Input gain, 370–72insmod, 94–95install switch (pilot-xfer),

310Integrity check mode

(Tripwire), 241International Phonetic

Alphabet, 424International Standards

Organization (ISO), 9Internet Control Message

Protocol (ICMP), 291Internet-distributed software

development, 7Internet service providers

(ISPs), 46, 134Internetworking with TCP/IP

(Comer), 73Interrupt driver, 69Interrupts, 69Intonation in speech synthesis,

423–24Intruder detection, 231–66

evidence left behind, 234–35Snort for, 249–66

attack profiles, 260command line arguments,

264false positives in, 261–62on home networks,

262–63knowledgeability about,

264–65output modules, 265packet monitoring,

logging, and triggering,250–51

preprocessors, 265rules, 251–59rules library, 260–61running, 263–64

23456789

2222222222333333333344444

INDEX 523

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 523

Page 6: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

Intruder detection (cont.)Tripwire for, 231, 235–47, 265

configuration of, 236–39database maintenance, 241database setup, 239–40forensics, 246–47history of, 236operation of, 235–36running, 241–46

IP address(es). See alsoNetwork(s)/networking

default gateway, 52dynamic vs. static, 46

ipc directory, 17IPChains, 48, 49, 51–54, 73–74

port blocking, 54rulesets, 51–52security rules, 53

IP datagrams, fragmented, 72–73IP firewalling, 49IP forwarding, 72ipmasqadm, 56, 57IP Masquerading, 46–47, 49.

See also NAT (networkaddress translation);Network(s)/networking:with one IP address

IP number, looking up, 300ipopts (Snort rule option), 254IP transparent proxy support, 49IPX, 86IPX/SPX, 86IRman infrared remote control,

431, 432, 435–36ISA Interface Standard, 63ISO, 9iso9660 file system, 352isof, 299–300iso images, making, 353–55ispell, 296ISPs, 46, 134itype (Snort rule option), 257

JJava, 131Java VNC client, 41–42Jazz++, 402, 403

Joint Photographics ExpertGroup, 441

Joliet extensions, 352Joliet file system support, 349JPEG encoding, 367jpilot, 326–30

backup features, 329, 330File menu, 326–29pilot-link in, 309–17, 329

KK-3D, 459, 460, 461, 475KDE, 302, 498KDE 2.0, 98, 99KeepAlive (SSH client option),

275Kernel 2.4, IP Masquerading on,

57–58Kernel configuration, 13–23

booting, 22–23build step, 20–21disaster recovery, 23installation, 21–22interactive system of, 18–20LILO boot loader, 13–15for networking with one IP

address, 49–51for PLIP, 64–69for port forwarding, 55–56for remote CD burning,

348–52/usr/src/linux base directory,

16–18kernel directory, 17Kernels

custom vs. generic, 9–10upgrading, 10

Keyrings, 198Keys, cryptographic, 196–97

expiration of, 200generating, 198–202integrity of, 206passphrases and, 209–10public, 196–98

exchanging, 206session, 207

Kim, Gene, 236

Kmail, GPG integration with, 212kmix program, 371“Knapsack” algorithm, 197–98kpilot, 320–26

applications conduits, 322–24daemon, 320GUI client program, 320setting up, 320–21

kserver, 121

LLAME, 381Laplink cable, 63–64lavplay, 488, 493lavrec, 487, 492lavtools, 487Layered sounds, 403LGPL (Lesser GPL; Library

GPL), 5–6lib directory, 18libnet, 221libnids, 220–21libpcap, 220, 224, 225libphp4.a file, 163License(s)

for Free Software, 4–7“viral”, 5

LILO boot loader, 13–15Linux as a tool, 1–3Linux Audio Video Tools, 487Linux Document Project, 304Listall switch (pilot-xfer), 312ListenAddress (SSH server

option), 278list switch (pilot-xfer), 311LML33, 486LocalForward (SSH client

option), 275–76Logging, Snort, 250–51login, 77log (Snort action), 252logto (Snort rule option), 254–56Loop-based sequencers, 410–12LOpht, 218Lossless compression, 439Lossy compression, 439LZW compression, 440–41

524 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 524

Page 7: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

Mmadplay, 417MagicLight, 459, 460, 475Magix MusicMaker, 410–11Mail. See E-mail; E-mail-based

console application;Web-mail service

Mail delivery agent (MDA), 136,141

mail (program), 213Mailsnarf, 222Mail transport agent (MTA),

136mailtunnel, 291Mail user agent (MUA), 136mailx, 301

GPG integration with, 213MainActor, 494MAKEDEV command, 370Make files, 11–12malsync, 330–31man, 300Management information

systems (MIS), 508Mandrake, 26“Man in the Middle” attack

(MITM), 269Manufacturing model, 508Maximum transmission unit

(MTU), 72MBR (master boot record), 14MDA, 136, 141Medical model, 508Melys, 402Memory handling, in Apache

API, 184–85menuconfig, 18–20merge switch (pilot-xfer),

310–11Message digest functions, 197,

235Message hashing algorithm,

197mg^2, 460, 475mgetty command, 82–84Microsoft Corporation, 63, 195,

500

Microsoft Windows, 1, 32applications running under

Linux. See wineinteroperability with. See

SambaX-servers for, 29–30

Microsoft Windows 2000, 106

Microsoft Windows XP, 369Microsoft Word 97, under wine,

342–43, 346MIDI, 400–408

computer hardware required,401

drum machines, 407–8musical notation on, 406recording, 405–6sequencing, 402–5software synthesis, 406–7

MindsEye, 460, 461, 475, 476mingetty, 77mIRC runs, 345Miridonov, Sergei, 486MIS, 508MITM attack, 269Mixers, audio, 370–72MixMagic, 411–12MJPEG, 483MJPEG Tools package, 487mkdictdb, 426mkisofs, 352, 354mm directory, 18MNG, 443–44Modelers, 3D graphics,

460–61Modems

cable, 48networking using dial-up,

47–48as tunneling devices, 288–89

MOD files, 408–9Modules, 19

Apache, 180–81modules, 21modules_install, 21Monaural, 367more, 297

MP3 files, 368–69, 381, 413–14burning to CDs, 418creating, 394–95players for, 416, 417–18

MP3 (MPEG Layer 3) format,442

MPEG-1, 483MPEG-2, 483MPEG playback, 497, 501–2mpg123, 417mpg3218, 417MPU-401 MIDI board, 401Msgsnarf, 222msg (Snort rule option), 254MTA, 136MTU, 72MUA, 136Mudge, Dr., 228MuLinux, 226–28, 303–4Multimedia system, cross-

platform, 303Multiple-image Network

Graphics (MNG), 443–44Multitrack hard disk recorders,

412–13MusE, 402Music

commercial, 497in videos, 496, 497

Musical notation, 406Music production, 399–420.

See also Audio processing

loop-based sequencers, 410–12

MIDI, 400–408computer hardware

required, 401drum machines, 407–8musical notation on, 406recording, 405–6sequencing, 402–5software synthesis, 406–7

MP3s, 413–14burning to CDs, 418creating, 394–95players for, 416, 417–18

23456789

2222222222333333333344444

INDEX 525

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 525

Page 8: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

Music production (cont.)multitrack hard disk recorders,

412–13shell scripts for, 418–20text-only commands for,

417–18Trackers, 408–10XMMS multimedia player,

303, 371, 382, 414–16,431, 435, 498

mutt, 301GPG integration with, 211

NNAT (network address

translation), 46, 47.See also IP Masquerading

NAT boxes, 58for PLIP networking, 71–74

NetBEUI, 86NetBIOS, 87net directory, 18Netfilter, 57Netscape

certificate acceptance process,166–70

GPG integration with, 213Network File System (NFS),

260Network firewalls, 49Network Neighborhood

(Windows), 90Network(s)/networking. See also

Communicationsattacks on, 232–34

browser-based, 288denial-of-service (DoS), 50,

232“Man in the Middle”

(MITM), 269profiles of, 260scripted, 234

defending, 265. See alsoFirewall(s); Intruderdetection

home, 262–63

nonrouting, 287–91HTTP proxies, 287–88tunneling through, 288–91

nonswitched Ethernet, 216with one IP address, 45–58

game hosting, 56–57hardware firewall/NAT

boxes, 58IPChains installation,

51–54IP Masquerading, 46–47, 49kernel 2.4 and, 57–58kernel configuration for,

49–51on modem connection,

47–48network address translation

(NAT), 46, 47port forwarding, 54–56on router connection (cable

or DSL), 48stand-alone router, 47

PLIP, 60–71kernel compilation to

enable, 64–69NAT set up for, 71–74PLIP tunnel set up, 69–71

scanning for hosts andservices, 300

sniffing. See Sniffingwith Windows. See SambaWindows applications under

wine, 345NFS, 260nmap, 233, 300nmblookup, 90–91Nonrouting networks, 287–91

HTTP proxies, 287–88tunneling, 288–91

through e-mail, 291httptunnel package,

289–91in ICMP messages, 291

Nonswitched Ethernet networks,216

nslookup, 300

OObfuscation phase of network-

based attack, 234Octal dump, 296od, 296.o files, 180Ogg Vorbis format, 369, 381One-way functions, 196“Open Source Certification and

Mark” program, 8Open source development, 7“Open Source” licenses, 5–6“Open Source” philosophy, 7OpenSSH, 53, 229, 267,

268–79file transfer with SCP, 270–71public key encryption in,

268–70telecommuting with, 273–74as virtual private network,

274–79client options, 274–77server options, 277–79

X11 forwarding, 271–72OpenSSH server, 280

forwarding, 284OpenSSL, 220Optimization as a router

(kernel configurationoption), 49

OS/2, 28OS/2 PMX server, 29OSD (Open Source Definition),

7Outlook, 195Output volume, 370–72

PPacket monitoring, 250–51Palm-connected organizers,

307–32Handspring Visor, 308–9jpilot, 326–30

backup features, 329, 330File menu, 326–29pilot-link in, 329

526 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 526

Page 9: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

kpilot, 320–26applications conduits,

322–24daemon, 320GUI client program, 320setting up, 320–21

malsync, 330–31pilot-link tools, 309–17pilot-manager, 317–20

Palm organizer, VNC client for,36

PalmOS devices. See Palm-connected organizers

Parallel Line Internet Protocol(PLIP) networking,60–71

kernel compilation to enable,64–69

NAT set up for, 71–74PLIP tunnel set up, 69–71

Parallel ports, 61–63PLIP networking and, 65wine support for, 345

parport, 69Partition table, 14Passive reconnaissance,

232–33Passphrases, 163–64, 200

for decryption, 209–10digital signatures and, 208

pass (Snort action), 252PasswordAuthentication (SSH

server option), 278Passwords, 105Pathologically eclectic rubbish

lister. See PerlPC Anywhere, 32PCM, 366–67PDAs. See Palm-connected

organizersPerens, Bruce, 7–8Perl, 2–3, 6, 225, 297PermitEmptyPasswords (SSH

server option), 278PermitRootLogin (SSH server

option), 278

Personal digital assistants(PDAs). See Palm-connected organizers

PGP, 196Pharmaceutical companies, 508Phoneme dictionaries, 427Phonemes, 424–25Phonetics, 424–25Photoshop, 445PHP, 177PHP4, 161–64, 177

testing installation of, 170Phrasing in speech synthesis,

423–24pidof, 298–99pilot-dedupe program (pilot-xfer),

311pilot-link, 309–17, 329pilot-manager, 317–20PILOTPORT environment

variable, 309PILOTRATE environment

variable, 309pilot-xfer, 309–17PIMP, 176Pine, GPG integration with, 212Pinnacle Systems Studio DC10

Plus video capture card,483–84, 486

Pipes, 294Pixels, 438Playlists, 417–18PLIP. See Parallel Line Internet

Protocol (PLIP)networking

PNG (Portable NetworkGraphics), 440, 441, 444

PocketQuicken, 331Point-to-Point Protocol (PPP),

47Polling, 69Port 21, blocking, 54Port 80/TCP, 166, 170Port 443/TCP, 166, 170Port forwarding, 54–56, 280–82PORTFW, 57

Portsblocking, 54“exporting” to outside world,

283–84parallel, 61–63

PLIP networking and, 65wine support for, 345

Port (SSH client option), 276Port (SSH server option), 278PostScript, 441PovRay, 457–58, 459

camera positioning in, 468colors and textures in, 466,

473–75front-ends for, 459–60lighting in, 466–683D logo (example), 471–732D logo (example), 469–71

PPP, 47Preprocessors, Snort, 265Pretty Good Privacy (PGP), 196Prime numbers, public-key

cryptography and, 198,207

Primitives (building blocks), 469Printer port cables, two-way,

63–64Printer sharing, 88, 95–96Private key, 196–98Procfs, 50Procmail, 134–35, 139–46, 147

command execution, 147recipes in, 140–46

for filtering, 141–42for processing commands,

142scripts, 142–46

.procmailrc file, 152Programmers, 508Promiscuous mode, Ethernet

card in, 216Pronunciation dictionaries, 426,

427PROTUX, 413PS/2 parallel port, 62pserver, 121

23456789

2222222222333333333344444

INDEX 527

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 527

Page 10: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

Public domain software, 4, 6Public key encryption, 197–98,

268–70Public keys, 196–98

exchanging, 206Purdue University, 236purge switch (pilot-xfer), 312Pygmalion, 460

Qqt-2.2.2, 498QuakeForge, 462Quantization, 443Quicken under wine, 346Quicktime, 483, 502

RRaster image format, 458RAW format, 368Raymond, Eric, 7–8Ray tracing, 458–59, 466RCP, 229, 268react (Snort rule option), 259RealPlayer, 502The Real Thud, 407Rebooting in Linux, 348Recipes, Procmail, 140–46

for filtering, 141–42for processing commands,

142scripts, 142–46

Reconnaissance phase ofnetwork-based attacks,232–33

Recorders, multitrack hard disk,412–13

Recording, audio, 371, 374–75MIDI, 405–6with SOX, 387, 388vinyl records, 387–89

RedHat, 9, 10, 26VNC on, 41

Redirection, 294Regular expressions (REs), 294Remote computing, 27–43

CD burning. See CDs: remoteburning of

through forwarded OpenSSHserver, 284–85

VNC, 29, 30, 32–43clients, 41–43environment, 33with Linux, 37–43server, 40–41Xvnc, 34–36

X basics, 31–32Remote copy (RCP), 229, 268RemoteForward (SSH client

option), 276Remote monitoring through

Web browser, 185–92coding, 186–89compiling, 189–91testing, 191–92

Remote shell (RSH), 268remove command (CVS), 123Request structure, Apache API,

182–83Resolution of image, 438Resource pools, Apache, 183resp (Snort rule option), 258–59REs (regular expressions), 294restore command (pilot-xfer),

310, 315–16Reverb sound effect, 380RGB (red-green-blue), 439, 442RhythmLab, 407Rio Volt, 419–20Ripping CDs, 372–73Rogue Spear games, 56–57Roland XP-30 synthesizer, 403–5

Jazz++ interoperability with,404

Root accounts, 11Root authority, 246Rosegarden, 402, 406Routers

cable or DSL, 48stand-alone, 47, 58

rpc (Snort rule option), 258RPM, 9RS-232 serial devices, 61RSAAuthentication (SSH client

option), 277

RSAAuthentication (SSH serveroption), 278

RSA/DSA authenticationmethod, 285–87

RSH (remote shell), 268Rsynth, 425–26R tools, 268Runlevels, 77

SSamba, 85–112

accessing shares, 92–96as client, 89–90graphical clients, 96–98listing shares, 91–92local network discovery, 90nmblookup, 90–91practical application, 101–2printer sharing, 88, 95–96as server, 102–10

in existing domain, 105–6options, 103–4smbpasswd, 105SWAT Web Administration

Tool, 106–10Windows 2000 issues, 106

SMB (Server Message Block)and, 86–88

workstation replacement,99–101

Sample files, 409Sandboxes (working directories),

120, 130SANE plug-ins, 446Saturation, color, 452Scanners, 447Scanning halftone images,

453–54Sced, 460SCP (secure copy), 229

file transfer with, 270–71port forwarding and, 282

Screenshots!, 502Scripted attacks on networks,

234scripts directory, 18SCSI emulation, 384

528 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 528

Page 11: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

SDL, 499Searching tools, 299–300Secure connectivity, 267–92

alternate authenticationmethods, 285–87

getting out of firewall, 279–82getting through firewall,

283–85to nonrouting networks,

287–91HTTP proxies, 287–88tunneling, 288–91

secure shell. See Secure shell(SSH)

Secure copy. See SCP (securecopy)

Secure shell daemon (SSHD),280

Secure shell (SSH), 267, 268–79,298. See also OpenSSH

file transfer with SCP, 270–71over httptunnel, 291public key encryption in,

268–70telecommuting with, 273–74as VPN, 274–79

client options, 274–77server options, 277–79

X11 forwarding, 271–72Secure socket layer (SSL), 161,

177Secure tunnel to insecure service,

281Security. See also Firewall(s);

Intruder detectione-mail. See GPG (GNU

Privacy Guard)of e-mail-based console

application, 135–36,147–54

GnuPG to encrypt results,148

GnuPG to handleauthorizations, 147–48

in IPChains, 53of precompiled kernels, 10

sed, 295

Sendmail, 136, 178September 11, 2001 attacks,

270seq (Snort rule option), 257Sequencers, loop-based,

410–12Sequencing, MIDI, 402–5Serial devices, 61Serial port, wine support for,

345Server(s). See also Web servers

e-mail, 287HTTP proxy, 287–88IMAP, 159–60OpenSSH, 280

forwarding, 284OS/2 PMX, 29Samba as, 102–10

in existing domain, 105–6options, 103–4smbpasswd, 105SWAT Web Administration

Tool, 106–10Windows 2000 issues, 106

SSH (SSHD), 269testing, 166–70

Session key, 207session (Snort rule option),

258setgid attribute, 117–18setuid attribute, 118Setuid root files, 247Sharp Viewcam VL-E650,

484Shells, 298–99Signatures, digital. See Digital

signaturesSite blocking, 288SMB2WWW, 98smbclient, 91–93smbfs, 93–95smbmount, 94–95smbpasswd, 105smbprint, 95–96SMB (Server Message Block),

86–88smbsh, 93–95

smbspool, 95smpeg, 501smpeg-XMMS, 502Sniffing, 215–29

attacking by, 217countermeasures against,

228–29. See also Intruderdetection

defending by, 217–18tools for, 218–28

dsniff, 218–23Ethereal, 225–26, 227–28MuLinux, 226–28, 303–4Sniffit, 218, 219, 226Supersniffer, 223–24TCPDump, 224–25

troubleshooting by, 217Sniffit, 218, 219, 226Snort, 249–66

attack profiles, 260command line arguments,

264false positives in, 261–62on home networks, 262–63knowledgeability about,

264–65output modules, 265packet monitoring, logging,

and triggering, 250–51preprocessors, 265rules, 251–59

header, 251–54options, 254–59

rules library, 260–61running, 263–64

.so files, 180Software distribution, capital

cost of, 507Software industry, 507–8Software requirement, 26Solitaire, 341Song, Dug, 218Soundcards, 370

with MIDI support, 401Sound effects, 377–80Sounds, layered, 403SoundTracker, 409, 410

23456789

2222222222333333333344444

INDEX 529

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 529

Page 12: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

Source code, 8–24compiling, 8–10

autoconf, 12–13Imakefiles, 11make files, 11–12

finding, 24GPL philosophy on, 5kernel customization, 13–23

booting, 22–23build step, 20–21disaster recovery, 23installation, 21–22interactive configuration

system, 18–20LILO boot loader, 13–15/usr/src/linux base directory,

16–18Sourceforge Web site, 24SOX

equalization with, 379–80file conversions with,

380–81recording with, 387, 388vinyl record cleanup with,

389–90volume adjustment with,

377–78Spafford, Eugene, 236Spam filters, 141Speech synthesis, 421–36

analyzing, 422–25phonetics, 424–25phrasing and intonation,

423–24tokenization, 422–23waveform generation, 425

examples, 428–36checking Internet mail at

login, 428–31file browser, 431–36

hardware vs. software, 421software packages, 425–28

Festival, 424, 426–28, 431Rsynth, 425–26

Spell checkers, 296in MS Word, 343

SpiralSynth, 407

SPP (standard parallel port),61–62

SquirrelMail, 176~/.ssh/authorized_keys file, 286.ssh/config file, 274SSHD (secure shell daemon),

280ssh-keygen, 285–86SSH (secure shell), 267, 268–79,

298. See also OpenSSHfile transfer with SCP, 270–71over httptunnel, 291public key encryption in,

268–70telecommuting through

firewalls with, 273–74as VPN, 274–79

client options, 274–77server options, 277–79

X11 forwarding, 271–72SSH server (SSHD), 269SSL, 161, 177Stallman, Richard M., 4–5, 6,

7, 8Stars!, 343–44Stellar Legacy, 343Stereo, 367Stereo offset, 380Storyboard, 489Stream editor program (sed), 295StrictModes (SSH server

option), 279String handling, in Apache API,

182, 183, 184–85strings command, 298Stuffed routing, 54sudo, 298Superblock, 14Supersniffer, 223–24SuSE, 9, 26

Web server implementation,115

svncviewer, 41–42SWAT Web Administration

Tool, 106–10Symmetric-key cryptographic

system, 196, 206–7

Sync applications. See Palm-connected organizers

sync command (pilot-xfer), 310,313–15

Synthesizers, 400–401, 403–5Sysctl, 51System compromise, 232, 233System V initialization model, 77

TTagged Image File Format

(TIFF), 441, 444Tape archive, 296tar, 296Tarballs, 11TCPDump, 224–25TCP/IP protocol, 32, 86TCP Syncookie support, 50TechTV, 505tektracker, 409Telecommuting, 273–74. See also

Remote computing;Secure connectivity

Telnet, 53, 229, 267, 268encrypted, 268secure, 283–84

Text files, 294–95Text-mode consoles, 76–77Textures, in PovRay, 466, 473–75TFTP, 2603dom, 460, 4753dPM, 460, 4753D graphics production, 457–80

animation, 461–62game engines, 462modelers, 460–61more tools for, 475–76PovRay, 457–58, 459

camera positioning in, 468colors and textures in, 466,

473–75front-ends for, 459–60lighting in, 466–683D logo (example), 471–732D logo (example), 469–71

raster and vector painting, 458ray tracing, 458–59, 466

530 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 530

Page 13: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

TIFF, 441, 444Timeline, video, 495TiMidity, 405–6tin, 302Titles, video, 496TkSMB, 96, 97Tokenization in speech synthesis,

422–23tos (Snort rule option), 254Total Annihilation, 345towav utility, 382Trackers, 408–10Traffic analysis, 270Translations, in graphics

production, 471Tridgell, Andrew, 86Triggering Snort, 250–51Trinux, 47Tripwire, 231, 235–47, 265

configuration of, 236–39database maintenance, 241database setup, 239–40forensics, 246–47history of, 236operation of, 235–36purpose of, 235running, 241–46

Trivial File Transfer Protocol(TFTP), 260

True Color, 439trueSpace, 476ttl (Snort rule option), 254Tunneling, 288–91

through e-mail, 291through firewalls, 273–74httptunnel package, 289–91in ICMP messages, 291secure, 281

TWIG, 176Two-way printer port cables,

63–64

UUndernets, 113–32

benefits of, 131for individual empowerment,

115–18

maintenance of, 118–31CVS, 120–28homepage creation, 128–30sandboxes (working

directories), 120, 130needs for, 114structure of, 114–15

Unisys, 440–41Universal Disk Format (UDF)

file system, 356Universal naming convention, 88Unix, 1, 2–3Unix Remote Copy (RCP), 229,

268update command (CVS), 123update command (pilot-xfer), 310Update mode (Tripwire), 241URLsnarf, 223USB ports, 447USB sync cradle, 309UsePrivilegedPort (SSH client

option), 277User accounts, 105User (SSH client option), 277

VValidating digital signatures,

204–6Vector image format, 458vi, 295Video4Linux, 482–83Video cameras, 484Video card requirement, 26Video CDs (VCDs), 504–5Video production, 481–505

capturing video, 484, 492–93editing clips, 493–97file formats, 483final rendering, 496gopher for, 488hardware, 483–85playback, 497–503

AVI, ASF, WMV, 498–501MPEG, 501–2other formats, 502–3

publishing, 504–5shooting, 490–91

software, 485–88capture and playback tools,

487–88drivers, 486nonlinear editing tools, 488

storyboard, 489studio setup, 491timeline, 495titles, 496transitions, 495Video4Linux, 482–83video sequence guide, 489, 490voice-overs and music, 496,

497Videotape, transferring digital

video to, 504vidrec, 492Vinyl record transfer to CDs,

384–95audio system and, 386–87CD creation, 393–94MP3 file creation, 394–95preparation for, 385–86recording, 387–89removing clicks, pops, and

hisses, 389–90trimming tracks, 390–93

“Viral” license, 5Virtual consoles, 76–77Virtual network console. See

VNCVirtual private network (VPN),

274–79client options, 274–77server options, 277–79SSH as, 274–79

Virusesboot sector, 14via e-mail. See GPG (GNU

Privacy Guard)V-mails (video e-mails), 505VNC, 29, 30, 32–43

clients, 41–43environment, 33with Linux, 37–43server, 40–41Xvnc, 34–36

23456789

2222222222333333333344444

INDEX 531

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 531

Page 14: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

vncserver, 37–43vncviewer, 41Voice-overs in videos, 496, 497Volume, output, 370–72Volume adjustment, 377–78Voodoo Tracker, 409Vorbis codec, 369

WWavelet transforms, 444WAV format, 368Web browser, remote

monitoring through,185–92

coding, 186–89compiling, 189–91testing, 191–92

Webcams, 484–85Web-clipping application, 330Web-mail service, 157–78

Aeromail installation, 165Aeromail use, 171–75IMAP server, 159–60other software packages,

176PHP4 support, 161–64, 170,

177resources on, 177–78SSL libraries configuration,

161system preparation, 159testing server, 166–70

Web pages, command line toolto retrieve, 300

Web servers. See Apache;Undernets

Web sitesimages on, 437for software, 26for source code, 24as tools, 304–6

wget, 300, 426which (program), 299Window manager, 28–29, 31Windows. See Microsoft

WindowsWindows Media Format, 369Wine, 331, 333–36

AIM client under, 339–40, 345

DirectX under, 345getting, 334MS Word 97 via, 342–43, 346network applications under,

345Quicken under, 346serial- and parallel-port

support, 345Solitaire via, 341Stars! under, 343–44status of, 333–34Total Annihilation under, 345wine.conf, 335–39

WMV files, 501Word 97, under wine, 342–43,

346Workstation replacement,

99–101

World Foundry, 462www.freshmeat.net, 304www.google.com, 24, 305www.jabber.org, 305–6www.linux.com, 304www.linuxdoc.org, 304www.linuxgames.com, 305www.lokigames.com, 305www.lwn.net, 305www.slashdot.org, 305www.sourceforge.net, 305

XX11 forwarding, 271–72X11Forwarding (SSH server

option), 279X-CD-Roast, 359–63xconfig, 18–20, 349XFree86, 11XMMS multimedia player, 303,

371, 382, 414–16, 431,435, 498

xscanimage program, 446X-server

for Windows, 29–30Xvnc as, 34–35

XSMBrowser, 96, 97xv, 303xvncviewer, 41X-windows, 27, 28–29, 31–32,

349

ZzImage kernel, 21

532 INDEX

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 532

Page 15: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 533

Page 16: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 534

Page 17: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 535

Page 18: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 536

Page 19: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 537

Page 20: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 538

Page 21: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 539

Page 22: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 540

Page 23: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 541

Page 24: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 542

Page 25: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 543

Page 26: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 544

Page 27: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 545

Page 28: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

Also from Addison-Wesley

Linux System AdministrationA User’s GuideMarcel Gagné

0-201-71934-7Paperback560 pages© 2002

This comprehensive, hands-on guide to Linux system administration provides you with the deeperunderstanding of the inner workings of Linux.

The Linux Companion for System Administrators,Second EditionJochen Hein

0-201-67525-0Paperback592 pages© 2001

Focusing on the use of Linux in a private orcorporate environment, this book will help the experienced Linux user attain a more efficient level of system administration.

Understanding Open Source SoftwareDevelopmentJoseph Feller, Brian Fitzgerald

0-201-73496-6Paperback224 pages© 2002

The first complete and objective synthesis of the available literature, offering a unique one-stop reference for developers, researchers, managers and anyone else needing to grasp the key issues about OSS.

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 546

Page 29: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

23456789

2222222222333333333344444

Solutions from experts

you knowand trust.

www.informit.com

www.informit.com

OPERATING SYSTEMS

WEB DEVELOPMENT

PROGRAMMING

NETWORKING

CERTIFICATION

AND MORE…

Expert Access.Free Content.

Free, indepth articles and supplements

Master the skills you need,when you need them

Choose from industry leadingbooks, ebooks, and trainingproducts

Achieve industry certificationand advance your career

Get answers when you need them from live experts or InformIT’s comprehensive library

Visit

and get great content

from

Articles Books Expert Q&AFree Library Training News Downloads

Addison-Wesley and InformIT are trademarks of Pearson plc /Copyright©2000 pearson

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 547

Page 30: I 2 NDEX [ptgmedia.pearsoncmg.com]ptgmedia.pearsoncmg.com/images/0201734206/index/... · B Backdoor software, 54 backupswitch (pilot-xfer), 310, 312–13 BacteriuM, 407 bash, 298

4

6

90

4

6

90

4

6

90

4

6

90

4

28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 548