Sophie

Sophie

distrib > Mandriva > 9.2 > i586 > by-pkgid > a804ef007a99f7d26cf24253c2994680 > files > 1301

howto-html-ja-9.1-0.5mdk.noarch.rpm

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
 <META NAME="GENERATOR" CONTENT="SGML-Tools 1.0.9">
 <TITLE>Linux Security HOWTO: $B%;%-%e%j%F%#4X78$N>pJs8;(B</TITLE>
 <LINK HREF="Security-HOWTO-11.html" REL=next>
 <LINK HREF="Security-HOWTO-9.html" REL=previous>
 <LINK HREF="Security-HOWTO.html#toc10" REL=contents>
</HEAD>
<BODY>
<A HREF="Security-HOWTO-11.html">$B<!$N%Z!<%8(B</A>
<A HREF="Security-HOWTO-9.html">$BA0$N%Z!<%8(B</A>
<A HREF="Security-HOWTO.html#toc10">$BL\<!$X(B</A>
<HR>
<H2><A NAME="sources"></A> <A NAME="s10">10. $B%;%-%e%j%F%#4X78$N>pJs8;(B</A></H2>

<P>UNIX $B0lHL$N%;%-%e%j%F%#$H(B Linux $BFCDj$N%;%-%e%j%F%#$N$$$:$l$K$D$$$F$b(B, 
$BNI$$%5%$%H$,(B<EM>$B$?$/$5$s(B</EM>$B$"$j$^$9(B. $B%;%-%e%j%F%#$K4X$9$k%a!<%j%s%0(B
$B%j%9%H$r(B 1 $B$D(B($B$"$k$$$O$=$l0J>e(B)$B9XFI$7(B, $B%;%-%e%j%F%#$K4X$9$k=$@5$r>o$K(B
$B:G?7$N>uBV$K$7$F$*$/$3$H$,=EMW$G$9(B. $B0J2<$K5s$2$k%j%9%H$ONL$3$=>/$J$$$G(B
$B$9$,(B, $B$H$F$bM-1W$J$b$N$G$9(B. 
<P>
<H2><A NAME="ftpsites"></A> <A NAME="ss10.1">10.1 FTP $B%5%$%H(B</A>
</H2>

<P>CERT $B$O(B Computer Emergency Response Team $B$NN,$G$9(B. CERT $B$O:G?7$N967b$d(B
$B$=$NBP=h$K$D$$$F$N7Y9p$rH/9T$7$F$$$^$9(B. $B>\$7$/$O(B 
<A HREF="ftp://ftp.cert.org">cert.org</A> $B$r8+$F$/$@$5$$(B. 
<P>ZEDZ ($B85$O(B Replay $B$H8F$P$l$F$$$^$7$?(B)
(
<A HREF="http://www.zedz.net">http://www.zedz.net</A>)
$B$K$O%;%-%e%j%F%#4XO"%W%m%0%i%`$NBg$-$J%"!<%+%$%V$,$"$j$^$9(B.
$B$3$N%5%$%H$O%"%a%j%+9g=09q9qFb$K$O$"$j$^$;$s$N$G(B,
$B%"%a%j%+$NGO</$2$?0E9f5,@)$K=>$&I,MW$O$"$j$^$;$s(B.
<P>Matt Blaze $B;a$O(B CFS $B$N:n<T$G$"$j(B, $B%;%-%e%j%F%#$NBg2H$G$9(B. Matt $B;a$N%"!<(B
$B%+%$%V$,(B 
<A HREF="ftp://ftp.research.att.com/pub/mab">ftp://ftp.research.att.com/pub/mab</A> $B$K$"$j$^$9(B. 
<P><CODE>tue.nl</CODE> $B$O%*%i%s%@$K$"$kBg$-$J%;%-%e%j%F%#4X78(B FTP $B%5%$%H$G$9(B. 
<A HREF="ftp://ftp.win.tue.nl/pub/security/">ftp.win.tue.nl</A><P>
<H2><A NAME="websites"></A> <A NAME="ss10.2">10.2 $B%&%'%V%5%$%H(B</A>
</H2>

<P>
<UL>
<LI>The Hacker FAQ $B$O%O%C%+!<$K4X$9$k(B FAQ $B$G$9(B: 
<A HREF="http://www.solon.com/~seebs/faqs/hacker.html">The Hacker FAQ</A> </LI>
<LI>COAST $B%"!<%+%$%V$K$O(B UNIX $B$N%;%-%e%j%F%#4XO"%W%m%0%i%`$H>pJs$,$?$/$5$s(B
$B$"$j$^$9(B: 
<A HREF="http://www.cs.purdue.edu/coast/">COAST</A></LI>
<LI> SuSe $B$K$h$k%;%-%e%j%F%#$N%Z!<%8(B: 
<A HREF="http://www.suse.de/security/">http://www.suse.de/security/</A></LI>
<LI>Rootshell.com $B$O%7%9%F%`$NLdBj$rCN$k$N$KBgJQLrN)$D%5%$%H$G(B, $B8=:_$O%/%i%C(B
$B%+!<$K$b;H$o$l$F$$$^$9(B: 
<A HREF="http://www.rootshell.com/">http://www.rootshell.com/</A> </LI>
<LI>BUGTRAQ $B$O%;%-%e%j%F%#$K4X$9$k4+9p$rH/9T$7$F$$$^$9(B: 
<A HREF="http://www.netspace.org/lsv-archive/bugtraq.html">BUGTRAQ archives</A> </LI>
<LI>CERT (the Computer Emergency Response Team) $B$O(B
UNIX $B$KBP$9$k0lHLE*$J967b$K4X$9$k4+9p$rH/9T$7$F$$$^$9(B:
<A HREF="http://www.cert.org/">CERT $B$N%[!<%`%Z!<%8(B</A> 
<P>$BLuCm(B: $BF|K\$G$O(B
<A HREF="http://www.jpcert.or.jp/">JPCERT ($B%3%s%T%e!<%?6[5^BP1~%;%s%?!<(B)</A> $B$,3hF0$7$F$$$^$9(B.
<P>
</LI>
<LI>Dan Farmer $B;a$O(B SATAN $BEy$N%;%-%e%j%F%#4XO"%D!<%k$N:n<T$G$9(B. $B;a$N%[!<%`%Z!<(B
$B%8$K$O%;%-%e%j%F%#$K4X$9$k6=L#?<$$D4::7k2L$d%;%-%e%j%F%#4XO"%D!<%k$,$"(B
$B$j$^$9(B: 
<A HREF="http://www.trouble.org">Dan Farmers trouble.org</A></LI>
<LI>The linux security WWW $B$O(B Linux $B$N%;%-%e%j%F%#>pJs$rD4$Y$k$N$KJXMx$J%5(B
$B%$%H$G$9(B: 
<A HREF="http://www.aoy.com/Linux/Security/">Linux Security WWW</A></LI>
<LI>Infilsec $B$K$OFCDj$N%W%i%C%H%U%)!<%`$N%;%-%e%j%F%#E*$J<eE@$rD4$Y$k$3$H(B
$B$,$G$-$k8!:w%(%s%8%s(B(vulnerability engine)$B$,$"$j$^$9(B:
<A HREF="http://www.infilsec.com/vulnerabilities/">http://www.infilsec.com/vulnerabilities/</A></LI>
<LI>CIAC $B$O0lHLE*$JLdBj$K$D$$$FDj4|E*$K%;%-%e%j%F%#(B bulitin $B$rAw$C$F$/$l$^(B
$B$9(B:
<A HREF="http://ciac.llnl.gov/cgi-bin/index/bulletins">http://ciac.llnl.gov/cgi-bin/index/bulletins</A></LI>
<LI>Linux Pluggable Authentication Modules($B:9$7BX$(2DG=$JG'>Z%b%8%e!<%k(B)$B$N(B
$BNI$$F~Lg$,(B
<A HREF="http://www.kernel.org/pub/linux/libs/pam/">http://www.kernel.org/pub/linux/libs/pam/</A> $B$K$"$j$^$9(B. </LI>
<LI>Debian $B%W%m%8%'%/%H$K$O%;%-%e%j%F%#4X78$N=$@5%Q%C%1!<%8$H>pJs$r:\$;$?(B 
WWW $B%Z!<%8$,$"$j$^$9(B (
<A HREF="http://www.debian.org/security/">http://www.debian.org/security/</A>).
</LI>
<LI> WWW Security FAQ: $B$3$l$O(B Lincoln Stein $B;a$,=q$+$l$?J8=q$G(B, WWW 
$B$N%;%-%e%j%F%#$K4X$9$kAG@2$i$7$$;29MJ88%$G$9(B. 
<A HREF="http://www.w3.org/Security/Faq/www-security-faq.html">http://www.w3.org/Security/Faq/www-security-faq.html</A>
$B$r$4Mw$/$@$5$$(B. </LI>
</UL>
<P>
<P>
<H2><A NAME="ss10.3">10.3 $B%a!<%j%s%0%j%9%H(B</A>
</H2>

<P>Bugtraq: Bugtraq $B$r9XFI$9$k$K$O(B, listserv@netspace.org $B08$KK\J8$,(B
<PRE>
subscribe bugtraq
</PRE>
 $B$G$"$k%a!<%k$rAw$j$^$9(B.
($B%a!<%j%s%0%j%9%H$N%"!<%+%$%V$K$D$$$F$O(B, $BA0=R$N%j%s%/$r;2>H$7$F$/$@$5$$(B)
<P>CIAC: majordomo@tholia.llnl.gov $B08$K(B, $BK\J8(B($B%5%V%8%'%/%H$G$O$"$j$^$;$s(B)$B$,(B 
<PRE>
subscribe ciac-bulletin
</PRE>
 $B$G$"$k%a!<%k$rAw$j$^$9(B. 
<P>Red Hat $B$O$?$/$5$s$N%a!<%j%s%0%j%9%H$r1?1D$7$F$$$^$9$,(B,
$B$=$NCf$G$bFC$K=EMW$J$N$,(B redhat-announce $B%a!<%j%s%0%j%9%H$G$9(B.
$B%;%-%e%j%F%#(B ($B$d(B, $B$=$NB>(B)
$B$N=$@5%Q%C%1!<%8$K4X$9$k>pJs$,=P$k$H$9$0$K$3$3$KEj9F$5$l$^$9(B.
Subject $B$,(B 
<PRE>
Subscribe
</PRE>
 $B$G$"$k%a!<%k$r(B
redhat-announce-list-request@redhat.com $B08$KAw$C$F$/$@$5$$(B. 
$B$h$j>\$7$$>pJs$d5-;v$N%"!<%+%$%V$K$D$$$F$O(B 
<A HREF="http://www.redhat.com/mailing-lists/redhat-announce-list/">http://www.redhat.com/mailing-lists/redhat-announce-list/</A>
$B$r$4Mw$/$@$5$$(B.
<P>
<P>Debian $B%W%m%8%'%/%H$b%;%-%e%j%F%#99?7%Q%C%1!<%8$r07$&%a!<%j%s%0%j%9%H(B
$B$r1?1D$7$F$$$^$9(B. $B>\$7$/$O(B 
<A HREF="http://www.debian.org/security/">http://www.debian.org/security/</A> $B$r$4Mw$/$@$5$$(B. 
<P>
<P>
<H2><A NAME="ss10.4">10.4 $B=q@R(B</A>
</H2>

<P>$B%;%-%e%j%F%#4X78$NNI=q$O$?$/$5$s$"$j$^$9(B. $B$3$N>O$G$O$=$N0lIt$r>R2p$7$^(B
$B$9(B. $B%;%-%e%j%F%#@lLg$NK\$K2C$((B, $B%7%9%F%`4IM}$NK\$NB?$/$G$b%;%-%e%j%F%#(B
$B$NOCBj$r07$C$F$$$^$9(B. 
<P>$BLuCm(B: $B$3$l$i$NK\$NOBLu$,$"$l$P$<$R$*CN$i$;$/$@$5$$(B.
<P>Building Internet Firewalls By D. Brent Chapman &amp; Elizabeth D. Zwicky
<P>                                  1st Edition September 1995
<P>                                  ISBN: 1-56592-124-0
<P>$BLuCm(B: $BOBLu$O(B
<P>$B2NBeOB@54FLu!V%U%!%$%"%&%)!<%k$N9=C[(B $B!A%$%s%?!<%M%C%H%;%-%e%j%F%#!A!W(B
<P>                                  $B3t<02q<R%*%i%$%j!<%8%c%Q%s(B, 1996
<P>                                  ISBN: 4-900900-03-6
<P>                                  $B>R2p%Z!<%8(B: http://www.oreilly.co.jp/BOOK/firewall/
<P>$B$G$9(B. 
<P>Practical UNIX &amp; Internet Security, 2nd Edition By Simson Garfinkel &amp; Gene Spafford
<P>                                  2nd Edition April 1996
<P>                                  ISBN: 1-56592-148-8
<P>$BLuCm(B: $BOBLu$O(B
<P>$B;38}1Q4FLu!V(BUNIX &amp; $B%$%s%?!<%M%C%H%;%-%e%j%F%#!W(B
<P>                                  $B3t<02q<R%*%i%$%j!<%8%c%Q%s(B, 1998
<P>                                  ISBN: 4-900900-38-9
<P>                                  $B>R2p%Z!<%8(B: http://www.oreilly.co.jp/BOOK/puis/
<P>$B$G$9(B. 
<P>Computer Security Basics By Deborah Russell &amp; G.T. Gangemi, Sr.
<P>                                  1st Edition July 1991
<P>                                  ISBN: 0-937175-71-4
<P>Linux Network Administrator's Guide By Olaf Kirch
<P>                                  1st Edition January 1995
<P>                                  ISBN: 1-56592-087-2
<P>PGP: Pretty Good Privacy By Simson Garfinkel
<P>                                  1st Edition December 1994
<P>                                  ISBN: 1-56592-098-8
<P>$BLuCm(B: $BOBLu$O(B
<P>$B;3K\OBI'4FLu!V(BPGP $B0E9f%a!<%k$HEE;R=pL>!W(B
<P>                                  $B3t<02q<R%*%i%$%j!<%8%c%Q%s(B, 1996
<P>                                  ISBN: 4-900900-02-8
<P>$B$G$9(B. 
<P>Computer Crime A Crimefighter's Handbook By David Icove, Karl Seger &amp; 
William VonStorch (Consulting Editor Eugene H. Spafford) 
<P>                                  1st Edition August 1995
<P>                                  ISBN: 1-56592-086-4
<P>
<P>Linux Security By John S. Flowers 
<P>                                  New Riders; 
<P>                                  ISBN: 0735700354
<P>                                  March 1999
<P>
<P>Maximum Linux Security : A Hacker's Guide to Protecting Your Linux
Server and Network 
<P>                                  Anonymous
<P>                                  Paperback - 829 pages 
<P>                                  Sams; 
<P>                                  ISBN: 0672313413
<P>                                  July 1999
<P>$BLuCm(B: $BOBLu$O(B
<P>$B%H%C%W%9%?%8%*Lu!V(BLinux$BHG(B $B%/%i%C%+!<7^7b40A4%,%$%I!W(B
<P>                                  $B3t<02q<R%$%s%W%l%9(B, 2000
<P>                                  ISBN: 4844313606
<P>$B$G$9(B. 
<P>Intrusion Detection By Terry Escamilla
<P>                                  Paperback - 416 pages (September 1998)
<P>                                  John Wiley and Sons; 
<P>                                  ISBN: 0471290009   
<P>
<P>Fighting Computer Crime
<P>                                  Donn Parker 
<P>                                  Paperback - 526 pages (September 1998)
<P>                                  John Wiley and Sons; 
<P>                                  ISBN: 0471163783
<HR>
<A HREF="Security-HOWTO-11.html">$B<!$N%Z!<%8(B</A>
<A HREF="Security-HOWTO-9.html">$BA0$N%Z!<%8(B</A>
<A HREF="Security-HOWTO.html#toc10">$BL\<!$X(B</A>
</BODY>
</HTML>