CERT Security links# Security - 系统安全
z*w
1 楼
Steps for Recovering from a UNIX or NT System Compromise:
http://www.cert.org/tech_tips/root_compromise.html
Security Tools:
http://www.cert.org/tech_tips/security_tools.html
ftp://ftp.cert.org/pub/tools
Ongoing Network Monitoring Attacks:
http://www.cert.org/advisories/CA-1994-01.html
UNIX Configuration Guidelines:
http://www.cert.org/tech_tips/unix_configuration_guidelines.
html
Windows NT Configuration Guidelines:
http://www.cert.org/tech_tips/win_configuration_guidelines.h
tml
http://www.cert.org/tech_tips/root_compromise.html
Security Tools:
http://www.cert.org/tech_tips/security_tools.html
ftp://ftp.cert.org/pub/tools
Ongoing Network Monitoring Attacks:
http://www.cert.org/advisories/CA-1994-01.html
UNIX Configuration Guidelines:
http://www.cert.org/tech_tips/unix_configuration_guidelines.
html
Windows NT Configuration Guidelines:
http://www.cert.org/tech_tips/win_configuration_guidelines.h
tml