Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Figures

Figures

Fig. 3.1 The TCP/IP Model

Fig. 3.2 Difference between a Repeater and a Switch

Fig. 3.3 Converting Cleartext into Ciphertext through Encryption

Fig. 4.1 File Type and Permissions

Fig. 5.1 Linux-PAM Overview

Fig. 5.2 PAM-Controlled Password Change

Fig. 6.1 S/Key OTP System

Fig. 8.1 Flow of Log Messages

Fig. 10.1 TCP_Wrappers Intercepts and Filters Requests

Fig. 11.1 RSA Host-Based Authentication

Fig. 11.2 Rhosts and RSA Authentication

Fig. 11.3 RSA Authentication

Fig. 11.4 SSH Authentication Flowchart

Fig. 11.5 Using SSH Local Forwarding

Fig. 12.1 The Crack Directory Tree

Fig. 12.2 General Flow of the Guessing Process in Crack

Fig. 12.3 Flow of the Application of Rules to a Dictionary Word

Fig. 13.1 The tiger Directory Tree

Fig. 14.1 Functional Overview of Tripwire

Fig. 15.1 CFS Flow of Events

Fig. 16.1 ipchains Flow of Events

Fig. 16.2 Linux IP Masquerading

Fig. 16.3 Small Internal Network Example

Fig. 16.4 Dual Connection Requirement for ftp

  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint