fm.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 372 行 · 第 1/2 页

HTM
372
字号
<I>the</I> <I>GS utilities</I>) are free. The chief differences between these twodistributions are that Rops is smaller, easier to configure, and faster. In fact,it is probably one of the best shareware products I have ever seen; it is incrediblysmall for the job that it does and requires minimal memory resources. It was codedby Roger Willcocks, a software engineer in London, England.</P><P>In contrast, the GS utilities are slower, but support many more fonts and othersubtle intricacies you will likely encounter in PostScript documents produced ondisparate platforms. In other words, on documents that Rops fails to decode, theGS utilities will probably still work. The GS utilities also have more tolerancefor faults within a PostScript document. If you have never used a PostScript interpreter,there are certain situations you may encounter that seem confusing. One such situationis where the interpreter cannot find evidence of page numbering. If you encounterthis problem, you will only be able to move forward in the document (you will notbe able to go back to page 1 after you have progressed to page 2). In such instances,it's best to print the document.</P><P>To avoid this problem, I have purposefully (and by hand) searched out alternateformats. That is, for each PostScript document I encountered, I tried to find theidentical paper in PDF, TXT, DOC, WPG, or HTML. In some cases, I'm afraid, I couldnot find the document in any other form (this was especially so with early classicpapers on Internet security). In cases where I did successfully find another format,I have pointed you there instead of to the PostScript version. I did this becausethe majority of PC users (with the exception of Mac users) do not routinely havePostScript facilities on their machines.</P><P>Next I need to say several things about the hyperlinks in this book. Each onewas tested by hand. In certain instances, I have offered links overseas to papersthat are also available here in the United States. This is because I tried to pickthe most reliable links possible. By <I>reliable links</I>, I mean the links mosteasily retrieved in the shortest time possible. Although you wouldn't think so, someoverseas links are much faster. Also, in some instances, I could only find a verifiedlink to a document overseas (<I>verified links</I> means that when I tested the link,the requested item actually existed at the URL in question). To provide you withmaximum value, I have attempted to reduce the incidences of <TT>Object Not Found</TT>to practically nil. Naturally, however, your mileage may vary. Sites often changetheir structure, so expect a few links to be no longer valid (even though most werechecked just a month or two before the book's printing.)</P><P>Also, many hyperlink paths are expressed in their totality, meaning that whereverpossible, I have extracted the <I>total</I> address of an object and not simply theserver on which it resides. In reference to downloadable files (tools, usually),these links will not bring you to a page. Instead, they will initiate a downloadsession to your machine, bringing the file directly to you. This will save you time,but might first be confusing to less experienced users. Don't be surprised when adialog box appears, asking you to save a file.</P><P>Wherever I specify what language a tool or software program was written in, paycareful attention. Many tools mentioned require either a compiler or an interpreterbefore they can be built and used. If you do not currently have the language or interpreternecessary (or if your platform is different from that for which the tool was designed),re-examine the reference. Unless it seems that the distribution contains documentsthat are of value to you, you should probably refrain from downloading it. Moreover,many utilities come in source code form only. Although I have examined much of thesource code myself, I cannot vouch for each and every line of it. If you intend todownload source code and compile it on your own architecture, be aware that neitherI nor Sams can be responsible for trojans or other malicious code that may existin these files. The majority of files referenced are actually from reliable sourcesand many are accompanied by digital signatures, PGP keys, or other co-signing assurancesof authenticity and integrity. However, code that originated on cracker sites mayor may not be clean. Use your judgment in these instances.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>Special note to Windows and Mac	users: if you have no idea what I am talking about, fear not. You will by the time	you reach Chapter 6, &quot;A Brief Primer on TCP/IP.&quot; I made every possible	attempt to make this book easily read and understood for all users. I have taken	great pains to explain many terms and procedures along the way. If you are already	aware of the definitions, skip these passages. If you are not, read them carefully.<HR></BLOCKQUOTE><P>The majority of the sites referenced are easily viewed by anyone. There may bea few sites that use extensive table structures or maintain an all-graphic interface.Those with noncompliant browsers may not be able to view these sites. Nonetheless,there are very few such sites. Wherever possible, I have attempted to find alternatepages (that support non-table browsers) so almost all of the pages are viewable usingany browser. However, I am not perfect; my efforts may fail in some cases. For this,I apologize.</P><P>In reference to sites mentioned that I deem &quot;very good,&quot; a word of caution:This is my opinion only. I classify sites as &quot;good&quot; if they impart informationthat is technically sound or point you in many valuable directions. But simply becauseI say one site is good and say nothing about another does not mean the other siteis bad. I have hand-picked every site here, and each offers good information on security.Those I single out as particularly good are so identified usually because the maintainerof that site has done an exemplary job of presenting the information.</P><P>With respect to hyperlinks, I will say this: At the end of Appendix A, &quot;Whereto Get More Information,&quot; I offer an uncommented, bare list of hyperlinks. Thisis the equivalent of a huge bookmark file. There is a purpose for this, which I discussin detail within that Appendix, but I will briefly address that purpose now. Thatlist (which will also appear on the CD-ROM) is provided for serious students of security.By loading that list into a personal robot (Clearweb is one good example), you canbuild a huge security library on your local machine. Such personal robots rake thepages on the list, retrieving whatever file types you specify. For companies thathave adequate disk space and are looking to build a security library, this can bedone automatically. Most robots will clone a remote site within a few minutes.</P><P>Be aware, however, that the majority of links offered lead to pages with manylinks themselves. Thus, if you are running such a robot, you'd better have adequatedisk space for the output. Printed in their native form, all retrievable documentsin that list (if retrieved with a robot that goes out one level for each link) wouldprint a stack of paper approximately seven feet tall. I know this because I havedone it. In Appendix A, I describe the procedure to do so. If you decide to retrieveand print written information and binaries from all the sites listed, you will havethe majority of written security knowledge available on the Internet within two weeks.In organizations doing serious security research, this could have significant value,particularly if all documents are reformatted to a single file format (you coulddo special indexing and so forth).</P><P>Certain books or other documents have been referenced that are not available online.These documents are obtainable, however. In all cases, I have included as much informationon them as possible. Sometimes, the ISBN or ISSN is included, and sometimes not.ISBNs were not always obtainable. In these instances (which are admittedly rare),I have included the Library of Congress catalog number or other, identifying featuresthat may help you find the referenced material offline. Any sources that could notbe traced down (either on the Net or elsewhere) were omitted from the book.</P><P>Moreover, I have made every possible effort to give credit to individuals whoauthored or otherwise communicated information that is of technical value. This includespostings in Usenet newsgroups, mailing lists, Web pages, and other mediums. In almostall cases (with the exception of the list of vendors that appears in Appendix B,&quot;Security Consultants&quot;), I have omitted the e-mail addresses of the parties.True, you can obtain those addresses by going to various sites, but I refrained fromprinting them within this book. I have made every effort to respect the privacy ofthese individuals.</P><P>The list of vendors that appears in Appendix B was not taken from the local telephonebook. In March 1997, I issued a bulletin to several key security groups requestingthat vendors place a listing in this book. The people (and companies) who repliedare all qualified security vendors and consultants. These vendors and individualsprovide security products and services every day. Many deal in products that havebeen evaluated for defense-level systems or other typically secure environments.They represent one small portion of the cream of the crop. If a vendor does not appearon this list, it does not mean that it is not qualified; it simply means that thevendor did not want to be listed in a book written by an anonymous author. Securitypeople are naturally wary, and rightly so.</P><P>In closing, I have some final words of advice. Appendix C, &quot;A Hidden Message,&quot;points to a block of encrypted text located on the CD-ROM. The encryption used wasPretty Good Privacy (PGP). When (or rather, if) you decrypt it, you will find a statementthat reveals an element of the Internet that is not widely understood. However, withinfive years, that element will become more clear to even the average individual. Thereare several things that you need to know about that encrypted statement.</P><P>First, the encrypted text contains my opinion only. It is not the opinion of Sams.net.In fact, to ensure that Sams.net is not associated with that statement, I have takenthe precaution of refusing to provide employees of Sams.net with the private passphrase.Therefore, they have absolutely no idea what the statement is. Equally, I assureyou (as I have assured Sams.net) that the statement does not contain profanity orany other material that could be deemed unsuitable for readers of any age. It isa rather flat, matter-of-fact statement that warns of one facet of the Internet thateveryone, including security specialists, have sorely missed. This facet is of extremesignificance, not simply to Americans, but to all individuals from every nation.At its most basic, the statement is a prognostication.</P><P>Now for a little note on how to decrypt the statement. The statement itself isvery likely uncrackable, because I have used the highest grade encryption possible.However, you can determine the passphrase through techniques once common to the spytrade. Contained in Appendix C are several lines of clear text consisting of a seriesof characters separated by semi-colons (semi-colons are the field separator character).After you identify the significance of these characters, you are presented with someinteresting possibilities. After trying them all, you will eventually crack thatstatement (the significance of the clear text fields will reveal the passphrase).If you are clever, cracking the message is easier than it looks (certainly, thosewild and crazy characters at NSA will have no problem, as long as the folks doingit are vintage and not kids; that is about the only clue I will give). The publickey for the message is <TT>root@netherworld.net</TT>.</P><P>If you crack the message, you should forward it to all members of Congress. Forthem, a group largely uneducated about the Internet, the message within that encryptedtext is of critical importance.</P><P>Good luck.<FONT COLOR="#000077"></FONT></P><CENTER><P><HR><A HREF="../ch01/ch01.htm"><IMG SRC="../button/next.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Next chapter" BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif"WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <BR><BR><BR><IMG SRC="../button/corp.gif" WIDTH="284" HEIGHT="45" ALIGN="BOTTOM" ALT="Macmillan Computer Publishing USA"BORDER="0"></P><P>&#169; <A HREF="../copy.htm">Copyright</A>, Macmillan Computer Publishing. Allrights reserved.</CENTER></BODY></HTML>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?