fm.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 372 行 · 第 1/2 页

HTM
372
字号
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"><HTML><HEAD>		<TITLE>Maximum Security -- Introduction </TITLE></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF"><CENTER><H1><IMG SRC="../button/samsnet.gif" WIDTH="171" HEIGHT="66" ALIGN="BOTTOM" BORDER="0"></H1></CENTER><CENTER><P><A HREF="../ch01/ch01.htm"><IMG SRC="../button/next.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Next chapter" BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif"WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <HR></CENTER><CENTER><H1></H1><H1><FONT COLOR="#000077">Maximum Security: <BR>A Hacker's Guide to Protecting Your Internet Site and Network</FONT></H1></CENTER><H2><FONT COLOR="#000077">Dedication</FONT></H2><CENTER><P><I>This book is dedicated to Michelle, whose presence has rendered me a princeamong men.</I></P></CENTER><P><P><H2><FONT COLOR="#000077">Acknowledgments</FONT></H2><P>My acknowledgments are brief. First, I would like to acknowledge the folks atSams, particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray,Bob Correll, and Kate Shoup. Without them, my work would resemble a tangled, horriblemess. They are an awesome editing team and their expertise is truly extraordinary.</P><P>Next, I extend my deepest gratitude to Michael Michaleczko, and Ron and StacieLatreille. These individuals offered critical support, without which this book couldnot have been written.</P><P>Also, I would like to recognize the significant contribution made by John DavidSale, a network security specialist located in Van Nuys, California. His input wasinvaluable. A similar thanks is also extended to Peter Benson, an Internet and EDIConsultant in Santa Monica, California (who, incidentally, is the current chairmanof ASC X12E). Peter's patience was (and is) difficult to fathom. Moreover, I forwarda special acknowledgment to David Pennells and his merry band of programmers. Thosecats run the most robust and reliable wire in the southwestern United States.<H2><FONT COLOR="#000077">About the Author</FONT></H2><P>The author describes himself as a &quot;UNIX propeller head&quot; and is a dedicatedadvocate of the Perl programming language, Linux, and FreeBSD.</P><P>After spending four years as a system administrator for two California health-carefirms, the author started his own security-consulting business. Currently, he specializesin testing the security of various networking platforms (breaking into computer networksand subsequently revealing what holes lead to the unauthorized entry) including butnot limited to Novell NetWare, Microsoft Windows NT, SunOS, Solaris, Linux, and MicrosoftWindows 95. His most recent assignment was to secure a wide area network that spansfrom Los Angeles to Montreal.</P><P>The author now lives quietly in southern California with a Sun SPARCStation, anIBM RS/6000, two Pentiums, a Macintosh, various remnants of a MicroVAX, and his wife.</P><P>In the late 1980s, the author was convicted of a series of financial crimes afterdeveloping a technique to circumvent bank security in Automatic Teller Machine systems.He therefore prefers to remain anonymous.<H3><FONT COLOR="#000077">Tell Us What You Think!</FONT></H3><P>As a reader, you are the most important critic and commentator of our books. Wevalue your opinion and want to know what we're doing right, what we could do better,what areas you'd like to see us publish in, and any other words of wisdom you'rewilling to pass our way. You can help us make strong books that meet your needs andgive you the computer guidance you require.</P><P>Do you have access to the World Wide Web? Then check out our site at <A HREF="http://www.mcp.com"><TT>http://www.mcp.com</TT></A>.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>If you have a technical question	about this book, call the technical support line at 317-581-3833 or send e-mail to	<A HREF="mailto:suppor@mcp.com"><TT>suppor@mcp.com</TT></A>.<HR></BLOCKQUOTE><P>As the team leader of the group that created this book, I welcome your comments.You can fax, e-mail, or write me directly to let me know what you did or didn't likeabout this book--as well as what we can do to make our books stronger. Here's theinformation:</P><P>FAX: 317-581-4669<BR></P><P>E-mail: </P><P>Mark Taber<BR><A HREF="mailto:newtech_mgr@sams.mcp.com"><TT>newtech_mgr@sams.mcp.com</TT></A><TT></TT></P><P>Mail: </P><P>Mark Taber<BR>Comments Department<BR>Sams Publishing<BR>201 W. 103rd Street<BR>Indianapolis, IN 46290<H2><FONT COLOR="#000077">Introduction</FONT></H2><P>I want to write a few words about this book and how it should be used. This bookis not strictly an instructional, or &quot;How To&quot; book. Its purpose is to getyou started on a solid education in Internet security. As such, it is probably constructeddifferently from any computer book you have ever read.</P><P>Although this book cannot teach you everything you need to know, the referencescontained within this book can. Therefore, if you know very little about Internetsecurity, you will want to maximize the value of this book by adhering to the followingprocedure:</P><P>Each chapter (except early ones that set the stage) contains intermittent referencesthat might point to white papers, technical reports, or other sources of solid, reliableinformation of substance (pertaining to the topic at hand). Those references appearin boxes labeled <I>XREF.</I> As you encounter each source, stop for a moment toretrieve that source from the Net. After you retrieve the source, read it, then continuereading the book. Throughout the book, perform this operation whenever and whereverapplicable. If you do so, you will finish with a very solid basic education on Internetsecurity.</P><P>I have constructed this book in this manner because Internet security is not astatic field; it changes rapidly. Nonetheless, there are certain basics that everyperson interested in security must have. Those basics are not contained (in theirentirety) in any one book (perhaps not even in dozens of them). The information islocated on the Internet in the form of documents written by authorities on the subject.These are the people who either designed and developed the Internet or have designedand developed its security features. The body of their work is vast, but each paperor technical report is, at most, 40 pages in length (most are fewer than 10).</P><P>Those readers who want only a casual education in Internet security may read thebook without ever retrieving a single document from the Internet. But if you aresearching for something more, something <I>deeper</I>, you can obtain it by adheringto this procedure.</P><P>If you choose to use the book as a reference tool in the manner I have described,there are certain conventions that you need to know. If the resource you have beendirected to is a tool, consider downloading it even if it is not for your platform.With a proper archive tool (like Winzip), you can extract the documents that accompanythe distribution of that tool. Such documents often contain extremely valuable information.For example, the now famous scanner named <I>SATAN</I> (made expressly for UNIX)contains security tutorials in HTML. These do not require that you have UNIX (infact, all they require is a browser). Likewise, many other tools contain documentsin PDF, TXT, DOC, PS, and other formats that are readable on any platform.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>TIP:</B></FONT><B> </B>SATAN is a special case. Some of	the tutorials are in HTML but have <TT>*.PL</TT> extensions. These extensions are	used to signify documents that are written in Perl. If you do not have Perl installed,	convert these documents to raw HTML. To do so, open them in a text editor and replace	the first line (<TT>&lt;&lt; HTML</TT>) with <TT>&lt;HTML&gt;</TT>. Then rename the	file with either an <TT>*.HTM</TT> or an <TT>*.HTML</TT> extension. From that point	on, your browser will load the pages perfectly.<HR></BLOCKQUOTE><P>Also, note that many of the Internet documents referenced in this book are availablein PostScript form only. PostScript is a wonderful interpreted language that drawsgraphics and text. It is used primarily in technical fields. To view some of thesedocuments, therefore, you will require a PostScript reader (or interpreter). If youdo not already have Adobe Illustrator or some other proprietary PostScript package,there are two leading utilities:<UL>	<LI>Rops	<LI>Ghostscript/Ghostview</UL><P>Both are freely available for download on the Internet. Rops is available here:<UL>	<LI><A HREF="ftp://ftp.winsite.com/pub/pc/winnt/txtutil/rops3244.zip"><TT>ftp://ftp.winsite.com/pub/pc/winnt/txtutil/rops3244.zip</TT></A><TT></TT></UL><P>Ghostscript and Ghostview are available here:<UL>	<LI><A HREF="ftp://ftp.cs.wisc.edu/ghost/aladdin/gs353w32.zip"><TT>ftp://ftp.cs.wisc.edu/ghost/aladdin/gs353w32.zip</TT></A><BR>	<BR>		<LI><A HREF="http://www.cs.wisc.edu/%7Eghost/gsview/index.html"><TT>http://www.cs.wisc.edu/%7Eghost/gsview/index.html</TT></A><TT></TT></UL><P>I should point out that Rops is shareware, while Ghostscript and Ghostview (hereafter,

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?