On Fri, 23 Jan 2004 [EMAIL PROTECTED] wrote: > On 19 Jan 2004, Bryan J. Smith wrote: > > > Here's my suggestions (_not_ complete, comprehensive): > > > > Application Security: Apache, FTP, DNS w/Auth, etc... > > Host Access Control: TCP Wrappers, Sudo, DAC/MAC (as above) > > Host Local/Network Filesystems: Ext3/XFS ACLs, NFS/Samba, AFS > > Host Auditing: Syslog, Kernel (maybe 2.6-focused?), Select Add-ons > > Host/Net Filter: NetFilter/IPTables, IPTable Modules > > Network Authentication: Kerberos, LDAP-SASL > > Vunerability Scans: nmap, Nessus, other "top 10/25" tools > > Host IDS: Tripwire, other checksumming tools (one begins with "A", > > can't remember because I don't use it, but I should) > > Network IDS: Snort, complementary tools, other "top 10/25" tools > >
DRP? Forenics recovery? _______________________________________________ lpi-examdev mailing list [EMAIL PROTECTED] http://list.lpi.org/mailman/listinfo/lpi-examdev