On Fri, 23 Jan 2004 [EMAIL PROTECTED] wrote:

> On 19 Jan 2004, Bryan J. Smith wrote:
> 
> > Here's my suggestions (_not_ complete, comprehensive):  
> > 
> > Application Security:  Apache, FTP, DNS w/Auth, etc...
> > Host Access Control:  TCP Wrappers, Sudo, DAC/MAC (as above)
> > Host Local/Network Filesystems:  Ext3/XFS ACLs, NFS/Samba, AFS
> > Host Auditing:  Syslog, Kernel (maybe 2.6-focused?), Select Add-ons
> > Host/Net Filter:  NetFilter/IPTables, IPTable Modules
> > Network Authentication:  Kerberos, LDAP-SASL
> > Vunerability Scans:  nmap, Nessus, other "top 10/25" tools
> > Host IDS:  Tripwire, other checksumming tools (one begins with "A",
> > can't remember because I don't use it, but I should)
> > Network IDS:  Snort, complementary tools, other "top 10/25" tools
> > 


  DRP?

  Forenics recovery?


_______________________________________________
lpi-examdev mailing list
[EMAIL PROTECTED]
http://list.lpi.org/mailman/listinfo/lpi-examdev

Reply via email to