CD-ROM contains: security tools developed by author; publicly available security tools; modified version of popclient; author's GPG 1.0.1 public key.Intrusion, Prevention, Detection, and Recovery Bob Toxen. Usually, spies ... Many systems are so accommodating that they will ask the intruder what file on the disk she would like to boot as the kernel. Without special configuration, simply supplying the single parameter when booting Linux will bypass all password checks.
|Title||:||Real-world Linux Security|
|Publisher||:||Prentice Hall Professional - 2001|