old-www/REF/INTRO/Intrusion-INTRO/index.html

285 lines
3.6 KiB
HTML

<HTML
><HEAD
><TITLE
>Introduction to Intrusion Protection and Network Security</TITLE
><META
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.76b+
"><LINK
REL="NEXT"
TITLE="Introduction"
HREF="intro.html"></HEAD
><BODY
CLASS="ARTICLE"
BGCOLOR="#FFFFFF"
TEXT="#000000"
LINK="#0000FF"
VLINK="#840084"
ALINK="#0000FF"
><DIV
CLASS="ARTICLE"
><DIV
CLASS="TITLEPAGE"
><H1
CLASS="TITLE"
><A
NAME="AEN2">Introduction to Intrusion Protection and Network Security</H1
><DIV
CLASS="AUTHORGROUP"
><A
NAME="AEN4"><H3
CLASS="AUTHOR"
><A
NAME="AEN5"
>Jennifer Vesperman</A
></H3
><DIV
CLASS="AFFILIATION"
><DIV
CLASS="ADDRESS"
><P
CLASS="ADDRESS"
>jenn@linuxchix.org</P
></DIV
></DIV
><H3
CLASS="AUTHOR"
><A
NAME="AEN11"
>Megan Golding</A
></H3
><DIV
CLASS="AFFILIATION"
><DIV
CLASS="ADDRESS"
><P
CLASS="ADDRESS"
>meggolding@yahoo.com</P
></DIV
></DIV
></DIV
><P
CLASS="PUBDATE"
>2002-02-24<BR></P
><DIV
CLASS="REVHISTORY"
><TABLE
WIDTH="100%"
BORDER="0"
><TR
><TH
ALIGN="LEFT"
VALIGN="TOP"
COLSPAN="3"
><B
>Revision History</B
></TH
></TR
><TR
><TD
ALIGN="LEFT"
>Revision 0.1</TD
><TD
ALIGN="LEFT"
>2002-02-17</TD
><TD
ALIGN="LEFT"
>Revised by: MEG</TD
></TR
><TR
><TD
ALIGN="LEFT"
COLSPAN="3"
>Converted from text file. Modified wording.</TD
></TR
><TR
><TD
ALIGN="LEFT"
>Revision 0.2</TD
><TD
ALIGN="LEFT"
>2002-02-23</TD
><TD
ALIGN="LEFT"
>Revised by: MEG</TD
></TR
><TR
><TD
ALIGN="LEFT"
COLSPAN="3"
>Incorporated Jenn's suggestions.</TD
></TR
><TR
><TD
ALIGN="LEFT"
>Revision 0.3</TD
><TD
ALIGN="LEFT"
>2002-02-24</TD
><TD
ALIGN="LEFT"
>Revised by: MEG</TD
></TR
><TR
><TD
ALIGN="LEFT"
COLSPAN="3"
>Conforming to LDP standards. Added abstract.</TD
></TR
></TABLE
></DIV
><DIV
><DIV
CLASS="ABSTRACT"
><A
NAME="AEN34"><P
></P
><P
> In this introduction to protecting your computers from intrusion, the author discusses concepts of computer security. Selecting good passwords, using firewalls, and other security concepts are introduced.
</P
><P
></P
></DIV
></DIV
><HR></DIV
><DIV
CLASS="TOC"
><DL
><DT
><B
>Table of Contents</B
></DT
><DT
>1. <A
HREF="intro.html"
>Introduction</A
></DT
><DD
><DL
><DT
>1.1. <A
HREF="intro.html#COPYRIGHT"
>Copyright Information</A
></DT
><DT
>1.2. <A
HREF="intro.html#OVERVIEW"
>Overview</A
></DT
></DL
></DD
><DT
>2. <A
HREF="frontdoor.html"
>The Locked Front Door</A
></DT
><DT
>3. <A
HREF="passwords.html"
>Passwords</A
></DT
><DT
>4. <A
HREF="permissions.html"
>Permissions</A
></DT
><DT
>5. <A
HREF="firewalls.html"
>Firewalls</A
></DT
><DT
>6. <A
HREF="othermeasures.html"
>Other security measures</A
></DT
><DD
><DL
><DT
>6.1. <A
HREF="othermeasures.html#UNUSED"
>Unused programs</A
></DT
><DT
>6.2. <A
HREF="othermeasures.html#BUGS"
>Bugs &#38; patches</A
></DT
><DT
>6.3. <A
HREF="othermeasures.html#MONITORING"
>Monitoring</A
></DT
><DT
>6.4. <A
HREF="othermeasures.html#WHAT"
>What do I do if I think I've been broken into?</A
></DT
><DT
>6.5. <A
HREF="othermeasures.html#FINAL"
>Final words</A
></DT
></DL
></DD
><DT
>7. <A
HREF="links.html"
>Links and further information</A
></DT
></DL
></DIV
></DIV
><DIV
CLASS="NAVFOOTER"
><HR
ALIGN="LEFT"
WIDTH="100%"><TABLE
SUMMARY="Footer navigation table"
WIDTH="100%"
BORDER="0"
CELLPADDING="0"
CELLSPACING="0"
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>&nbsp;</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
>&nbsp;</TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
><A
HREF="intro.html"
ACCESSKEY="N"
>Next</A
></TD
></TR
><TR
><TD
WIDTH="33%"
ALIGN="left"
VALIGN="top"
>&nbsp;</TD
><TD
WIDTH="34%"
ALIGN="center"
VALIGN="top"
>&nbsp;</TD
><TD
WIDTH="33%"
ALIGN="right"
VALIGN="top"
>Introduction</TD
></TR
></TABLE
></DIV
></BODY
></HTML
>