Sponsored Content
Full Discussion: Need Help
Special Forums Cybersecurity Need Help Post 52172 by obitus on Friday 11th of June 2004 08:10:24 PM
Old 06-11-2004
I don't think you really understand what a honey pot is. A honey pot is a machine with fake services on it that tries to attract crackers and (most of the time) logs them so they can be dealt with.

However, I do commend you on wanting to learn how things work. If you want a good understanding of how unix works, I strongly suggest avoiding alot of main stream Linux distributions and opt for something a little more BSDish (OpenBSD, NetBSD, FreeBSD, Slackware Linux, etc). Another good option for learning about how the operating systems work is Gentoo Linux.

If your focus is security, I'd suggest reading some of the stuff on Packet Storm. However, don't use that information on machine you are not an admin for.

If you focus is how GNU/Linux works, Linux From Scratch will show you how things are glued together from a million parts.

If you focus is operating system design and you know how to code, I'd suggest one of the BSD's (OpenBSD for security).
 
secconfig(8)						      System Manager's Manual						      secconfig(8)

NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security) SYNOPSIS
/usr/sbin/sysman secconfig NOTE: The secsetup utility has been replaced by the secconfig graphical interface. DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have loaded the enhanced security subsets. You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot the system. For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and to restrict the setting of the execute bit to root only. For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming, and password controls. When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con- vuser utility to migrate user accounts. While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths differ between base and enhanced security, and thus user account conversions do not succeed without a password change. NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect at the next reboot. FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8), Security delim off secconfig(8)
All times are GMT -4. The time now is 05:19 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy