old-www/LDP/solrhe/Securing-Optimizing-Linux-R.../sysintegrity.html

194 lines
2.9 KiB
HTML

<HTML
><HEAD
><TITLE
>Software -Securities/System Integrity</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.60"><LINK
REL="HOME"
TITLE="Securing and Optimizing Linux"
HREF="index.html"><LINK
REL="UP"
TITLE="Software -Networking"
HREF="soft-net.html"><LINK
REL="PREVIOUS"
TITLE="Installed files"
HREF="chap16sec135.html"><LINK
REL="NEXT"
TITLE="Linux Tripwire 2.2.1"
HREF="chap17sec136.html"></HEAD
><BODY
CLASS="chapter"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="NAVHEADER"
><TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TH
COLSPAN="3"
ALIGN="center"
>Securing and Optimizing Linux: RedHat Edition -A Hands on Guide</TH
></TR
><TR
><TD
WIDTH="10%"
ALIGN="left"
VALIGN="bottom"
><A
HREF="chap16sec135.html"
>Prev</A
></TD
><TD
WIDTH="80%"
ALIGN="center"
VALIGN="bottom"
></TD
><TD
WIDTH="10%"
ALIGN="right"
VALIGN="bottom"
><A
HREF="chap17sec136.html"
>Next</A
></TD
></TR
></TABLE
><HR
ALIGN="LEFT"
WIDTH="100%"></DIV
><DIV
CLASS="chapter"
><H1
><A
NAME="pr6ch17SSSI"
>Chapter 17. Software -Securities/System Integrity</A
></H1
><DIV
CLASS="TOC"
><DL
><DT
><B
>Table of Contents</B
></DT
><DT
>17.1. <A
HREF="chap17sec136.html"
>Linux Tripwire 2.2.1</A
></DT
><DT
>17.2. <A
HREF="chap17sec137.html"
>Configure the <TT
CLASS="filename"
>/var/tmp/install.cfg</TT
> file</A
></DT
><DT
>17.3. <A
HREF="chap17sec138.html"
>Configuration files</A
></DT
><DT
>17.4. <A
HREF="chap17sec139.html"
>Configure the <TT
CLASS="filename"
>/usr/TSS/policy/twpol.txt</TT
> file</A
></DT
><DT
>17.5. <A
HREF="chap17sec140.html"
>Securing Tripwire for Linux</A
></DT
><DT
>17.6. <A
HREF="chap17sec141.html"
>Integrity or Interactive Check Mode</A
></DT
><DT
>17.7. <A
HREF="chap17sec142.html"
>Installed files</A
></DT
></DL
></DIV
><DIV
CLASS="highlights"
><A
NAME="AEN9298"
></A
><P
>&#13; A typical Red Hat Linux server installation handles approximately 30,400 files. At their busiest times, administrators can't check the integrity of all system files, and if a cracker has accessed your
server, he or she can install or modify files without your knowledge with some effort. Since such a possibility exists a few programs have been created to respond to this kind of activity.
</P
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
><A
HREF="chap16sec135.html"
>Prev</A
></TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="index.html"
>Home</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="chap17sec136.html"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>Installed files</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
><A
HREF="soft-net.html"
>Up</A
></TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>Linux Tripwire 2.2.1</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>