Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
INDEX23456789
2222222222333333333344444
519
Aac3dec, 500Accent, 424Accounts, root, 11ack (Snort rule option), 257Actions, Snort, 252activate (Snort action), 252Active reconnaissance, 233add command (CVS), 123Aeromail, 158
installation of, 165using, 171–75
agetty command, 81–82AIM (AOL Instant Messenger),
54under wine, 339–40, 345
Albing, Greg, 477alert (Snort action), 252AllowUsers (SSH server option),
277Amplifier, audio, 386Amplitude-based method for
storing digital audio(PCM), 366–67
Analog-to-digital (A-D)conversion, 366
Animation, 461–62Anthem, 402Antisniff, 228Apache, 114, 158, 162, 177,
179–93API, 182–85module basics, 180–81
remote monitoring, 185–92coding, 186–89compiling, 189–91testing, 191–92
Apex DVD player, 419–20API, Apache, 182–85apxs tool, 189arch directory, 17Artistic License, 6aRts, 407ASF files, 500, 501Aspect ratio, 446Attachments, e-mail, 174Attacks on networks, 232–34
browser-based, 288denial-of-service (DoS), 50,
232“Man in the Middle” (MITM),
269profiles of, 260scripted, 234by sniffing, 217
Audacity waveform editor,375–77, 380, 387, 413
Audio CDs, burning, 363Audio processing, 365–97. See
also Music productionaudio files from CD, 372–73editing (cut and paste),
375–77format conversions, 380–82mixer properties, 370–72recording, 371, 374–75
sound effects and filtering,377–80
system preparation for, 370types of digital audio, 366–69
amplitude-based, 366–67frequency-based, 367, 369,
380–81MP3 (MPEG Layer 3)
format, 368–69, 381Ogg Vorbis format, 369,
381RAW format, 368WAV format, 368
vinyl record transfer to CDs,384–95
audio system and, 386–87CD creation, 393–94MP3 file creation, 394–95preparation for, 385–86recording, 387–89removing clicks, pops, and
hisses, 389–90trimming cuts, 390–93
writing audio to CDs, 382–84
Authentication, RSA/DSA,285–87
Autoconf, 12–13AvantGo, 330–31avifile, 497avifile-0.53.2, 499–500AVI files, 483, 497, 498–501AVI-XMMS-1.2.1, 501
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 519
BBackdoor software, 54backup switch (pilot-xfer), 310,
312–13BacteriuM, 407bash, 298Berkeley DB, 220Berkeley Software Distribution
(BSD) licenses, 6BIOS, 14Bit depth, 366Bit rate, 368–69Blackbox, 302BlackICE, 222bladeenc, 381Blender, 459, 460, 461, 475, 476BMP, 444Bootable CDs, 363/boot directory, 15Booting the kernel, 22–23Boot loader, LILO, 13–15Boot sector viruses, 14Bourne-again shell (bash), 298Brahms, 402, 406Broadcast 2000, 494Browser-based attacks, 288Browsers
network, 96–98Web, 185–92
BSD licenses, 6BTTV chip set, 486Buffer underruns, 353Building blocks (primitives), 469b[un]zip2, 296Burn All GIFs Web site, 441bzImage kernel, 21bzip, 21
CCable modems, 48Cable providers, 46Cables, two-way printer port,
63–64Cameras
digital, 447–48positioning, 468video, 484
Capital cost of softwaredistribution, 507
Capture, video, 484, 487–88,492–93
Cathedral and the Bazaar, The, 7CCD, 447cdda2wav, 352–53cdparanoia, 372–73cdrdao, 382–83cdrecord, 352–53, 356, 358,
382–83, 393–94CDs
audio, 363files from, 372–73MP3 on, 418writing, 382–84
remote burning of, 347–63audio CDs, 363blanking CD-RW, 355–58bootable CDs, 363burning data, 358–59duplicating CDs, 359–6280-min/700 mb CDs, 363finding drive, 355iso images, 353–55kernel modification for,
348–52mkisofs, 352, 354using GUID for, 359–61verifying, 359, 363
video (VCDs), 504–5vinyl record transfer to,
384–95audio system and, 386–87CD creation, 393–94MP3 file creation, 394–95preparation for, 385–86recording to hard disk,
387–89removing clicks, pops, and
hisses, 389–90trimming tracks, 390–93
Censorware, 223Certificates, 163
on Netscape, 166–70Change-coupled device (CCD),
447
checkout command (CVS), 122Chorus sound effect, 380Client-server configuration
for NAT, 72–74for PLIP networking, 70–71
Client/server model, CVS, 120
Clipping, 370–72Close-up, 32COAST project, 236Codecs
audio, 369video, 483, 487, 500
Color balance, 453Colors, in PovRay, 466, 473–75Comer, Douglas E., 73Command line, 2Commercial music, 497commit command (CVS), 122Communications, 59–84.
See also Network(s)/networking; Secureconnectivity
non-IP dialup, 74–84/etc/inittab file, 77–80getty, 76–77, 81–84
Parallel Line InternetProtocol (PLIP)networking, 60–71
kernel compilation toenable, 64–69
NAT set up for, 71–74PLIP tunnel set up, 69–71
Compiling, 8–10autoconf, 12–13as encryption, 507Imakefiles, 11make files, 11–12
Compressionin JPEG, 441–43LZW, 440–41
Compression/decompressionprogram, 296
CompressionLevel (SSH clientoption), 275
Compression (SSH clientoption), 275
520 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 520
Concurrent Versioning System.See CVS (ConcurrentVersioning System)
Configuration system,interactive, 18–20
Connectivity, secure. See Secureconnectivity
Console-based applicationse-mail-based, 133–55
connecting, 134–35e-mail concepts, 136–37Fetchmail, 136, 137–39Procmail, 134–35, 139–40,
147security issues, 135–36,
147–54MP3 player, 417–18
Consoles, text-mode, 76–77content-list (Snort rule option),
257content (Snort rule option),
256–57convert command
(ImageMagick), 445–46CPU requirement, 26crontab, 138–39Cryptographic basics, 196–98Crystal Space, 462, 475, 476CuBase VST, 402Cumulus, 407cut, 297CVS (Concurrent Versioning
System), 118, 120–28, 296commands, 121–23conflict resolution, 123–28core concepts, 120repository, 120–21
CVSROOT, 121Cygwin, 29
DData Encryption Standard
(DES), 196Datagrams, fragmented, 72–73Data-harvesting. See SniffingDCT, 442–43, 444dd, 295, 390–92
Debian, 26integrity checks by, 241–46VNC on, 40Web server implementation,
115Debian Free Software Guidelines
(DFSG), 7, 8Delay sound effect, 380delete switch (pilot-xfer), 311Demos, music, 408–9Denial-of-service (DoS) attack,
50, 232DenyUsers (SSH server
option), 277dep, 20–21Dia, 303Dialect, 424Dialup, non-IP, 74–84
/etc/inittab file, 77–80getty, 76–77, 81–84
Dictionariesphoneme, 427pronunciation, 426, 427
diff, 295Digital audio. See Audio
processingDigital cameras, 447–48Digital signatures, 135, 148,
203–6, 235. See alsoGPG (GNU PrivacyGuard)
encryption without, 210–11hashing functions for, 197passphrases and, 208validating, 204–6
direction, Snort, 254Directory Directives, 164DirectX, 345Discrete cosine transform
(DCT), 442–43, 444Display specification, 31distributed.net client, 53DivX, 483Documentation directory, 17Domain Naming System (DNS),
54, 253dpi (dots per inch), 438
Driver(s)interrupt, 69polling, 69video, 486
drivers directory, 17Drives, mapping, 99–100Drum machines, 407–8dsize (Snort rule option), 256DSL, 48dsniff, 218–23
compiling, 221–23required packages, 218–21
DUMB, 462Duplication of CDs, 359–62DVD players, 419–20Dynamic loading, 180dynamic (Snort action), 252
Eecasound, 413Echo sound effect, 380ECP, 63Editing
audio, 375–77video, 488, 493–97
Editors, 295waveform, 375–77, 380, 387,
413elm, 301
GPG integration with, 211ELM jukebox, 431E-mail
concepts, 136–37programs and utilities, 301–2security issues. See GPG
(GNU Privacy Guard)speech-driven checking at
login, 428–31tunneling through, 291video (V-mails), 505
E-mail-based consoleapplication, 133–55
connecting, 134–35Fetchmail, 136, 137–39, 301Procmail, 134–35, 139–46, 147
command execution, 147recipes in, 140–46
23456789
2222222222333333333344444
INDEX 521
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 521
E-mail-based consoleapplication (cont.)
security issues, 135–36,147–54
GnuPG to encrypt results,148
GnuPG to handleauthorizations, 147–48
E-mail clients, GPG integratedwith, 211–13
E-mail servers, 287Employee watching with HTTP
proxy, 288Emulators, 333Encapsulation, in JPEG
encoding, 443Encryption, 135, 196–98, 270.
See also GPG (GNUPrivacy Guard)
compilation as, 507passphrases for decryption,
209–10public key, 197–98, 268–70without signature, 210–11
Endianness, 368Enhanced capability port (ECP),
63Entrenchment phase of network-
based attack, 234Entropy pool, 201EPP (enhanced parallel port),
62–63EPS (Encapsulated PostScript),
441Equalizer, graphic, 378–80/etc/group file, 116/etc/inittab file, 77–80/etc/lilo.conf file, 14–15/etc/tripwire/tw.config file, 236Ethereal, 225–26, 227–28Ethernet card in promiscuous
mode, 216Ethernet networks, nonswitched,
216exclude switch (pilot-xfer), 311Exim, 136
ext, 121Extreme Wave, 460, 475
FFalse positives in Snort,
261–62Festival, 424, 426–28, 431Fetchmail, 134, 136, 137–39, 301.fetchmailrc file, 137, 140fetch switch (pilot-xfer), 311File browser, speech-driven,
431–36File management tools, 294–98file (program), 297Files, comparing, 295File Transfer Protocol. See FTPFile transfer with SCP, 270–71Filtering
frequency, 377, 378–80in Procmail, 141–42
Filters, spam, 141find, 299Finding, tools for, 299–300Firewall(s), 265
getting out of, 279–82getting through, 283–85hardware, 58http-proxy-only, 289IP, 49IP address of, 52maniacally restrictive, 285network, 49port forwarding by, 54–56rules, 73secure connections to, 53telecommuting through,
273–74tunneling through, 273–74
flags (Snort rule option), 256Flowcharting, 303Folder management on IMAP,
172–74Forte Agent, 345.forward file, 147Forwarding OpenSSH server,
284
ForwardX11 (SSH client option),275
Fourier, Jean Baptiste Joseph,367
fragbits (Snort rule option), 256Frame grabbers, 484Fraunhofer Group, 369“Free,” defining, 3–8FreeAmp, 371, 382, 417–20Freebirth, 407Free Software, 3, 508–9
licenses for, 4–7philosophy behind, 7
Great Schism in, 7–8Free Software Foundation
(FSF), 4Frequency-based method of
storing audio, 367, 369,380–81
Frequency filtering, 377, 378–80Freshmeat Web site, 24fs directory, 17fstab configuration file, 295FTP, 53, 54, 267, 268
encrypted, 268masquerading of, 72
Gg3d, 460, 475gAlan, 407Game engines, 3D, 462Game hosting, 56–57GatewayPorts (SSH client
option), 275GatewayPorts (SSH server
option), 277–78gcc (GNU C compiler), 5–6getty, 76–77
setting up, 81–84Ghostscript package, 88Gibbon, Edward, 507GIMP (GNU Image Manipula-
tion Program), 303, 445,451–53, 454
Giram, 460, 475GNOME, 302
522 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 522
GNU Lilypond, 406GnuPG, 135
authorizations handling by,147–48
encryption with, 148gpg4pine program, 212GPG (GNU Privacy Guard),
195–213cryptographic basics, 196–98encrypting files using, 202–3,
206–10integrating with e-mail clients,
211–13key generation, 198–202key-signing and trust levels in,
206private and public keys in,
196–98signing files using, 202–10unsigned, encrypted messages,
210–11gphoto package, 447–48GPL (GNU Public License),
4–5Graphic equalizer, 378–80Graphics file viewer, 303Green Box, 407grep, 299gSculpt, 460, 475Gseq, 402gserver, 121GTK-1.2, 225GUI tools, 302–3
for CD burning, 359–61pilot-manager, 317–20
g[un]zip, 296
HHandler functions, 187Handshaking, 62Handspring Visor, 308–9Hard disk recorders, multitrack,
412–13Hard disk requirement, 26Hardware requirements, 25–26Hashing algorithm, 197
hdrbench, 413Heads (monitor), 31Help, getting, 300–301Hewlett-Packard, 63High Color, 439Histogram, 451–52Home networks, 262–63Homepage, undernet, 128–30Host (SSH client option), 275HTC program, 289–91HTS program, 289HTTP, forwarding traffic, 56HTTP headers, 184HTTP proxy servers, 287–88httptunnel, 289–91Human capital of software
development, 507–8
IIANAL declaration, 4IBM, 216icmp_id (Snort rule option),
257ICMP (Internet Control
Message Protocol), 291ICMP Masquerading, 49icode (Snort rule option), 257IDE-SCSI emulation, 384id (Snort rule option), 254IEEE 1284 Extended
Capabilities PortProtocol, 63
ifconfig, 70–71ImageMagick, 445–46Image resolution, 438Imakefiles, 11imapd service, 160IMAP (Internet Message
Access Protocol) server,159–60
folder management on,172–74
IMP, 176import command (CVS), 122include directory, 17index.html, 115
inetd, 106info, 301init directory, 17Innovation3D, 460, 475Inodes, 238Input gain, 370–72insmod, 94–95install switch (pilot-xfer),
310Integrity check mode
(Tripwire), 241International Phonetic
Alphabet, 424International Standards
Organization (ISO), 9Internet Control Message
Protocol (ICMP), 291Internet-distributed software
development, 7Internet service providers
(ISPs), 46, 134Internetworking with TCP/IP
(Comer), 73Interrupt driver, 69Interrupts, 69Intonation in speech synthesis,
423–24Intruder detection, 231–66
evidence left behind, 234–35Snort for, 249–66
attack profiles, 260command line arguments,
264false positives in, 261–62on home networks,
262–63knowledgeability about,
264–65output modules, 265packet monitoring,
logging, and triggering,250–51
preprocessors, 265rules, 251–59rules library, 260–61running, 263–64
23456789
2222222222333333333344444
INDEX 523
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 523
Intruder detection (cont.)Tripwire for, 231, 235–47, 265
configuration of, 236–39database maintenance, 241database setup, 239–40forensics, 246–47history of, 236operation of, 235–36running, 241–46
IP address(es). See alsoNetwork(s)/networking
default gateway, 52dynamic vs. static, 46
ipc directory, 17IPChains, 48, 49, 51–54, 73–74
port blocking, 54rulesets, 51–52security rules, 53
IP datagrams, fragmented, 72–73IP firewalling, 49IP forwarding, 72ipmasqadm, 56, 57IP Masquerading, 46–47, 49.
See also NAT (networkaddress translation);Network(s)/networking:with one IP address
IP number, looking up, 300ipopts (Snort rule option), 254IP transparent proxy support, 49IPX, 86IPX/SPX, 86IRman infrared remote control,
431, 432, 435–36ISA Interface Standard, 63ISO, 9iso9660 file system, 352isof, 299–300iso images, making, 353–55ispell, 296ISPs, 46, 134itype (Snort rule option), 257
JJava, 131Java VNC client, 41–42Jazz++, 402, 403
Joint Photographics ExpertGroup, 441
Joliet extensions, 352Joliet file system support, 349JPEG encoding, 367jpilot, 326–30
backup features, 329, 330File menu, 326–29pilot-link in, 309–17, 329
KK-3D, 459, 460, 461, 475KDE, 302, 498KDE 2.0, 98, 99KeepAlive (SSH client option),
275Kernel 2.4, IP Masquerading on,
57–58Kernel configuration, 13–23
booting, 22–23build step, 20–21disaster recovery, 23installation, 21–22interactive system of, 18–20LILO boot loader, 13–15for networking with one IP
address, 49–51for PLIP, 64–69for port forwarding, 55–56for remote CD burning,
348–52/usr/src/linux base directory,
16–18kernel directory, 17Kernels
custom vs. generic, 9–10upgrading, 10
Keyrings, 198Keys, cryptographic, 196–97
expiration of, 200generating, 198–202integrity of, 206passphrases and, 209–10public, 196–98
exchanging, 206session, 207
Kim, Gene, 236
Kmail, GPG integration with, 212kmix program, 371“Knapsack” algorithm, 197–98kpilot, 320–26
applications conduits, 322–24daemon, 320GUI client program, 320setting up, 320–21
kserver, 121
LLAME, 381Laplink cable, 63–64lavplay, 488, 493lavrec, 487, 492lavtools, 487Layered sounds, 403LGPL (Lesser GPL; Library
GPL), 5–6lib directory, 18libnet, 221libnids, 220–21libpcap, 220, 224, 225libphp4.a file, 163License(s)
for Free Software, 4–7“viral”, 5
LILO boot loader, 13–15Linux as a tool, 1–3Linux Audio Video Tools, 487Linux Document Project, 304Listall switch (pilot-xfer), 312ListenAddress (SSH server
option), 278list switch (pilot-xfer), 311LML33, 486LocalForward (SSH client
option), 275–76Logging, Snort, 250–51login, 77log (Snort action), 252logto (Snort rule option), 254–56Loop-based sequencers, 410–12LOpht, 218Lossless compression, 439Lossy compression, 439LZW compression, 440–41
524 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 524
Mmadplay, 417MagicLight, 459, 460, 475Magix MusicMaker, 410–11Mail. See E-mail; E-mail-based
console application;Web-mail service
Mail delivery agent (MDA), 136,141
mail (program), 213Mailsnarf, 222Mail transport agent (MTA),
136mailtunnel, 291Mail user agent (MUA), 136mailx, 301
GPG integration with, 213MainActor, 494MAKEDEV command, 370Make files, 11–12malsync, 330–31man, 300Management information
systems (MIS), 508Mandrake, 26“Man in the Middle” attack
(MITM), 269Manufacturing model, 508Maximum transmission unit
(MTU), 72MBR (master boot record), 14MDA, 136, 141Medical model, 508Melys, 402Memory handling, in Apache
API, 184–85menuconfig, 18–20merge switch (pilot-xfer),
310–11Message digest functions, 197,
235Message hashing algorithm,
197mg^2, 460, 475mgetty command, 82–84Microsoft Corporation, 63, 195,
500
Microsoft Windows, 1, 32applications running under
Linux. See wineinteroperability with. See
SambaX-servers for, 29–30
Microsoft Windows 2000, 106
Microsoft Windows XP, 369Microsoft Word 97, under wine,
342–43, 346MIDI, 400–408
computer hardware required,401
drum machines, 407–8musical notation on, 406recording, 405–6sequencing, 402–5software synthesis, 406–7
MindsEye, 460, 461, 475, 476mingetty, 77mIRC runs, 345Miridonov, Sergei, 486MIS, 508MITM attack, 269Mixers, audio, 370–72MixMagic, 411–12MJPEG, 483MJPEG Tools package, 487mkdictdb, 426mkisofs, 352, 354mm directory, 18MNG, 443–44Modelers, 3D graphics,
460–61Modems
cable, 48networking using dial-up,
47–48as tunneling devices, 288–89
MOD files, 408–9Modules, 19
Apache, 180–81modules, 21modules_install, 21Monaural, 367more, 297
MP3 files, 368–69, 381, 413–14burning to CDs, 418creating, 394–95players for, 416, 417–18
MP3 (MPEG Layer 3) format,442
MPEG-1, 483MPEG-2, 483MPEG playback, 497, 501–2mpg123, 417mpg3218, 417MPU-401 MIDI board, 401Msgsnarf, 222msg (Snort rule option), 254MTA, 136MTU, 72MUA, 136Mudge, Dr., 228MuLinux, 226–28, 303–4Multimedia system, cross-
platform, 303Multiple-image Network
Graphics (MNG), 443–44Multitrack hard disk recorders,
412–13MusE, 402Music
commercial, 497in videos, 496, 497
Musical notation, 406Music production, 399–420.
See also Audio processing
loop-based sequencers, 410–12
MIDI, 400–408computer hardware
required, 401drum machines, 407–8musical notation on, 406recording, 405–6sequencing, 402–5software synthesis, 406–7
MP3s, 413–14burning to CDs, 418creating, 394–95players for, 416, 417–18
23456789
2222222222333333333344444
INDEX 525
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 525
Music production (cont.)multitrack hard disk recorders,
412–13shell scripts for, 418–20text-only commands for,
417–18Trackers, 408–10XMMS multimedia player,
303, 371, 382, 414–16,431, 435, 498
mutt, 301GPG integration with, 211
NNAT (network address
translation), 46, 47.See also IP Masquerading
NAT boxes, 58for PLIP networking, 71–74
NetBEUI, 86NetBIOS, 87net directory, 18Netfilter, 57Netscape
certificate acceptance process,166–70
GPG integration with, 213Network File System (NFS),
260Network firewalls, 49Network Neighborhood
(Windows), 90Network(s)/networking. See also
Communicationsattacks on, 232–34
browser-based, 288denial-of-service (DoS), 50,
232“Man in the Middle”
(MITM), 269profiles of, 260scripted, 234
defending, 265. See alsoFirewall(s); Intruderdetection
home, 262–63
nonrouting, 287–91HTTP proxies, 287–88tunneling through, 288–91
nonswitched Ethernet, 216with one IP address, 45–58
game hosting, 56–57hardware firewall/NAT
boxes, 58IPChains installation,
51–54IP Masquerading, 46–47, 49kernel 2.4 and, 57–58kernel configuration for,
49–51on modem connection,
47–48network address translation
(NAT), 46, 47port forwarding, 54–56on router connection (cable
or DSL), 48stand-alone router, 47
PLIP, 60–71kernel compilation to
enable, 64–69NAT set up for, 71–74PLIP tunnel set up, 69–71
scanning for hosts andservices, 300
sniffing. See Sniffingwith Windows. See SambaWindows applications under
wine, 345NFS, 260nmap, 233, 300nmblookup, 90–91Nonrouting networks, 287–91
HTTP proxies, 287–88tunneling, 288–91
through e-mail, 291httptunnel package,
289–91in ICMP messages, 291
Nonswitched Ethernet networks,216
nslookup, 300
OObfuscation phase of network-
based attack, 234Octal dump, 296od, 296.o files, 180Ogg Vorbis format, 369, 381One-way functions, 196“Open Source Certification and
Mark” program, 8Open source development, 7“Open Source” licenses, 5–6“Open Source” philosophy, 7OpenSSH, 53, 229, 267,
268–79file transfer with SCP, 270–71public key encryption in,
268–70telecommuting with, 273–74as virtual private network,
274–79client options, 274–77server options, 277–79
X11 forwarding, 271–72OpenSSH server, 280
forwarding, 284OpenSSL, 220Optimization as a router
(kernel configurationoption), 49
OS/2, 28OS/2 PMX server, 29OSD (Open Source Definition),
7Outlook, 195Output volume, 370–72
PPacket monitoring, 250–51Palm-connected organizers,
307–32Handspring Visor, 308–9jpilot, 326–30
backup features, 329, 330File menu, 326–29pilot-link in, 329
526 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 526
kpilot, 320–26applications conduits,
322–24daemon, 320GUI client program, 320setting up, 320–21
malsync, 330–31pilot-link tools, 309–17pilot-manager, 317–20
Palm organizer, VNC client for,36
PalmOS devices. See Palm-connected organizers
Parallel Line Internet Protocol(PLIP) networking,60–71
kernel compilation to enable,64–69
NAT set up for, 71–74PLIP tunnel set up, 69–71
Parallel ports, 61–63PLIP networking and, 65wine support for, 345
parport, 69Partition table, 14Passive reconnaissance,
232–33Passphrases, 163–64, 200
for decryption, 209–10digital signatures and, 208
pass (Snort action), 252PasswordAuthentication (SSH
server option), 278Passwords, 105Pathologically eclectic rubbish
lister. See PerlPC Anywhere, 32PCM, 366–67PDAs. See Palm-connected
organizersPerens, Bruce, 7–8Perl, 2–3, 6, 225, 297PermitEmptyPasswords (SSH
server option), 278PermitRootLogin (SSH server
option), 278
Personal digital assistants(PDAs). See Palm-connected organizers
PGP, 196Pharmaceutical companies, 508Phoneme dictionaries, 427Phonemes, 424–25Phonetics, 424–25Photoshop, 445PHP, 177PHP4, 161–64, 177
testing installation of, 170Phrasing in speech synthesis,
423–24pidof, 298–99pilot-dedupe program (pilot-xfer),
311pilot-link, 309–17, 329pilot-manager, 317–20PILOTPORT environment
variable, 309PILOTRATE environment
variable, 309pilot-xfer, 309–17PIMP, 176Pine, GPG integration with, 212Pinnacle Systems Studio DC10
Plus video capture card,483–84, 486
Pipes, 294Pixels, 438Playlists, 417–18PLIP. See Parallel Line Internet
Protocol (PLIP)networking
PNG (Portable NetworkGraphics), 440, 441, 444
PocketQuicken, 331Point-to-Point Protocol (PPP),
47Polling, 69Port 21, blocking, 54Port 80/TCP, 166, 170Port 443/TCP, 166, 170Port forwarding, 54–56, 280–82PORTFW, 57
Portsblocking, 54“exporting” to outside world,
283–84parallel, 61–63
PLIP networking and, 65wine support for, 345
Port (SSH client option), 276Port (SSH server option), 278PostScript, 441PovRay, 457–58, 459
camera positioning in, 468colors and textures in, 466,
473–75front-ends for, 459–60lighting in, 466–683D logo (example), 471–732D logo (example), 469–71
PPP, 47Preprocessors, Snort, 265Pretty Good Privacy (PGP), 196Prime numbers, public-key
cryptography and, 198,207
Primitives (building blocks), 469Printer port cables, two-way,
63–64Printer sharing, 88, 95–96Private key, 196–98Procfs, 50Procmail, 134–35, 139–46, 147
command execution, 147recipes in, 140–46
for filtering, 141–42for processing commands,
142scripts, 142–46
.procmailrc file, 152Programmers, 508Promiscuous mode, Ethernet
card in, 216Pronunciation dictionaries, 426,
427PROTUX, 413PS/2 parallel port, 62pserver, 121
23456789
2222222222333333333344444
INDEX 527
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 527
Public domain software, 4, 6Public key encryption, 197–98,
268–70Public keys, 196–98
exchanging, 206Purdue University, 236purge switch (pilot-xfer), 312Pygmalion, 460
Qqt-2.2.2, 498QuakeForge, 462Quantization, 443Quicken under wine, 346Quicktime, 483, 502
RRaster image format, 458RAW format, 368Raymond, Eric, 7–8Ray tracing, 458–59, 466RCP, 229, 268react (Snort rule option), 259RealPlayer, 502The Real Thud, 407Rebooting in Linux, 348Recipes, Procmail, 140–46
for filtering, 141–42for processing commands,
142scripts, 142–46
Reconnaissance phase ofnetwork-based attacks,232–33
Recorders, multitrack hard disk,412–13
Recording, audio, 371, 374–75MIDI, 405–6with SOX, 387, 388vinyl records, 387–89
RedHat, 9, 10, 26VNC on, 41
Redirection, 294Regular expressions (REs), 294Remote computing, 27–43
CD burning. See CDs: remoteburning of
through forwarded OpenSSHserver, 284–85
VNC, 29, 30, 32–43clients, 41–43environment, 33with Linux, 37–43server, 40–41Xvnc, 34–36
X basics, 31–32Remote copy (RCP), 229, 268RemoteForward (SSH client
option), 276Remote monitoring through
Web browser, 185–92coding, 186–89compiling, 189–91testing, 191–92
Remote shell (RSH), 268remove command (CVS), 123Request structure, Apache API,
182–83Resolution of image, 438Resource pools, Apache, 183resp (Snort rule option), 258–59REs (regular expressions), 294restore command (pilot-xfer),
310, 315–16Reverb sound effect, 380RGB (red-green-blue), 439, 442RhythmLab, 407Rio Volt, 419–20Ripping CDs, 372–73Rogue Spear games, 56–57Roland XP-30 synthesizer, 403–5
Jazz++ interoperability with,404
Root accounts, 11Root authority, 246Rosegarden, 402, 406Routers
cable or DSL, 48stand-alone, 47, 58
rpc (Snort rule option), 258RPM, 9RS-232 serial devices, 61RSAAuthentication (SSH client
option), 277
RSAAuthentication (SSH serveroption), 278
RSA/DSA authenticationmethod, 285–87
RSH (remote shell), 268Rsynth, 425–26R tools, 268Runlevels, 77
SSamba, 85–112
accessing shares, 92–96as client, 89–90graphical clients, 96–98listing shares, 91–92local network discovery, 90nmblookup, 90–91practical application, 101–2printer sharing, 88, 95–96as server, 102–10
in existing domain, 105–6options, 103–4smbpasswd, 105SWAT Web Administration
Tool, 106–10Windows 2000 issues, 106
SMB (Server Message Block)and, 86–88
workstation replacement,99–101
Sample files, 409Sandboxes (working directories),
120, 130SANE plug-ins, 446Saturation, color, 452Scanners, 447Scanning halftone images,
453–54Sced, 460SCP (secure copy), 229
file transfer with, 270–71port forwarding and, 282
Screenshots!, 502Scripted attacks on networks,
234scripts directory, 18SCSI emulation, 384
528 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 528
SDL, 499Searching tools, 299–300Secure connectivity, 267–92
alternate authenticationmethods, 285–87
getting out of firewall, 279–82getting through firewall,
283–85to nonrouting networks,
287–91HTTP proxies, 287–88tunneling, 288–91
secure shell. See Secure shell(SSH)
Secure copy. See SCP (securecopy)
Secure shell daemon (SSHD),280
Secure shell (SSH), 267, 268–79,298. See also OpenSSH
file transfer with SCP, 270–71over httptunnel, 291public key encryption in,
268–70telecommuting with, 273–74as VPN, 274–79
client options, 274–77server options, 277–79
X11 forwarding, 271–72Secure socket layer (SSL), 161,
177Secure tunnel to insecure service,
281Security. See also Firewall(s);
Intruder detectione-mail. See GPG (GNU
Privacy Guard)of e-mail-based console
application, 135–36,147–54
GnuPG to encrypt results,148
GnuPG to handleauthorizations, 147–48
in IPChains, 53of precompiled kernels, 10
sed, 295
Sendmail, 136, 178September 11, 2001 attacks,
270seq (Snort rule option), 257Sequencers, loop-based,
410–12Sequencing, MIDI, 402–5Serial devices, 61Serial port, wine support for,
345Server(s). See also Web servers
e-mail, 287HTTP proxy, 287–88IMAP, 159–60OpenSSH, 280
forwarding, 284OS/2 PMX, 29Samba as, 102–10
in existing domain, 105–6options, 103–4smbpasswd, 105SWAT Web Administration
Tool, 106–10Windows 2000 issues, 106
SSH (SSHD), 269testing, 166–70
Session key, 207session (Snort rule option),
258setgid attribute, 117–18setuid attribute, 118Setuid root files, 247Sharp Viewcam VL-E650,
484Shells, 298–99Signatures, digital. See Digital
signaturesSite blocking, 288SMB2WWW, 98smbclient, 91–93smbfs, 93–95smbmount, 94–95smbpasswd, 105smbprint, 95–96SMB (Server Message Block),
86–88smbsh, 93–95
smbspool, 95smpeg, 501smpeg-XMMS, 502Sniffing, 215–29
attacking by, 217countermeasures against,
228–29. See also Intruderdetection
defending by, 217–18tools for, 218–28
dsniff, 218–23Ethereal, 225–26, 227–28MuLinux, 226–28, 303–4Sniffit, 218, 219, 226Supersniffer, 223–24TCPDump, 224–25
troubleshooting by, 217Sniffit, 218, 219, 226Snort, 249–66
attack profiles, 260command line arguments,
264false positives in, 261–62on home networks, 262–63knowledgeability about,
264–65output modules, 265packet monitoring, logging,
and triggering, 250–51preprocessors, 265rules, 251–59
header, 251–54options, 254–59
rules library, 260–61running, 263–64
.so files, 180Software distribution, capital
cost of, 507Software industry, 507–8Software requirement, 26Solitaire, 341Song, Dug, 218Soundcards, 370
with MIDI support, 401Sound effects, 377–80Sounds, layered, 403SoundTracker, 409, 410
23456789
2222222222333333333344444
INDEX 529
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 529
Source code, 8–24compiling, 8–10
autoconf, 12–13Imakefiles, 11make files, 11–12
finding, 24GPL philosophy on, 5kernel customization, 13–23
booting, 22–23build step, 20–21disaster recovery, 23installation, 21–22interactive configuration
system, 18–20LILO boot loader, 13–15/usr/src/linux base directory,
16–18Sourceforge Web site, 24SOX
equalization with, 379–80file conversions with,
380–81recording with, 387, 388vinyl record cleanup with,
389–90volume adjustment with,
377–78Spafford, Eugene, 236Spam filters, 141Speech synthesis, 421–36
analyzing, 422–25phonetics, 424–25phrasing and intonation,
423–24tokenization, 422–23waveform generation, 425
examples, 428–36checking Internet mail at
login, 428–31file browser, 431–36
hardware vs. software, 421software packages, 425–28
Festival, 424, 426–28, 431Rsynth, 425–26
Spell checkers, 296in MS Word, 343
SpiralSynth, 407
SPP (standard parallel port),61–62
SquirrelMail, 176~/.ssh/authorized_keys file, 286.ssh/config file, 274SSHD (secure shell daemon),
280ssh-keygen, 285–86SSH (secure shell), 267, 268–79,
298. See also OpenSSHfile transfer with SCP, 270–71over httptunnel, 291public key encryption in,
268–70telecommuting through
firewalls with, 273–74as VPN, 274–79
client options, 274–77server options, 277–79
X11 forwarding, 271–72SSH server (SSHD), 269SSL, 161, 177Stallman, Richard M., 4–5, 6,
7, 8Stars!, 343–44Stellar Legacy, 343Stereo, 367Stereo offset, 380Storyboard, 489Stream editor program (sed), 295StrictModes (SSH server
option), 279String handling, in Apache API,
182, 183, 184–85strings command, 298Stuffed routing, 54sudo, 298Superblock, 14Supersniffer, 223–24SuSE, 9, 26
Web server implementation,115
svncviewer, 41–42SWAT Web Administration
Tool, 106–10Symmetric-key cryptographic
system, 196, 206–7
Sync applications. See Palm-connected organizers
sync command (pilot-xfer), 310,313–15
Synthesizers, 400–401, 403–5Sysctl, 51System compromise, 232, 233System V initialization model, 77
TTagged Image File Format
(TIFF), 441, 444Tape archive, 296tar, 296Tarballs, 11TCPDump, 224–25TCP/IP protocol, 32, 86TCP Syncookie support, 50TechTV, 505tektracker, 409Telecommuting, 273–74. See also
Remote computing;Secure connectivity
Telnet, 53, 229, 267, 268encrypted, 268secure, 283–84
Text files, 294–95Text-mode consoles, 76–77Textures, in PovRay, 466, 473–75TFTP, 2603dom, 460, 4753dPM, 460, 4753D graphics production, 457–80
animation, 461–62game engines, 462modelers, 460–61more tools for, 475–76PovRay, 457–58, 459
camera positioning in, 468colors and textures in, 466,
473–75front-ends for, 459–60lighting in, 466–683D logo (example), 471–732D logo (example), 469–71
raster and vector painting, 458ray tracing, 458–59, 466
530 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 530
TIFF, 441, 444Timeline, video, 495TiMidity, 405–6tin, 302Titles, video, 496TkSMB, 96, 97Tokenization in speech synthesis,
422–23tos (Snort rule option), 254Total Annihilation, 345towav utility, 382Trackers, 408–10Traffic analysis, 270Translations, in graphics
production, 471Tridgell, Andrew, 86Triggering Snort, 250–51Trinux, 47Tripwire, 231, 235–47, 265
configuration of, 236–39database maintenance, 241database setup, 239–40forensics, 246–47history of, 236operation of, 235–36purpose of, 235running, 241–46
Trivial File Transfer Protocol(TFTP), 260
True Color, 439trueSpace, 476ttl (Snort rule option), 254Tunneling, 288–91
through e-mail, 291through firewalls, 273–74httptunnel package, 289–91in ICMP messages, 291secure, 281
TWIG, 176Two-way printer port cables,
63–64
UUndernets, 113–32
benefits of, 131for individual empowerment,
115–18
maintenance of, 118–31CVS, 120–28homepage creation, 128–30sandboxes (working
directories), 120, 130needs for, 114structure of, 114–15
Unisys, 440–41Universal Disk Format (UDF)
file system, 356Universal naming convention, 88Unix, 1, 2–3Unix Remote Copy (RCP), 229,
268update command (CVS), 123update command (pilot-xfer), 310Update mode (Tripwire), 241URLsnarf, 223USB ports, 447USB sync cradle, 309UsePrivilegedPort (SSH client
option), 277User accounts, 105User (SSH client option), 277
VValidating digital signatures,
204–6Vector image format, 458vi, 295Video4Linux, 482–83Video cameras, 484Video card requirement, 26Video CDs (VCDs), 504–5Video production, 481–505
capturing video, 484, 492–93editing clips, 493–97file formats, 483final rendering, 496gopher for, 488hardware, 483–85playback, 497–503
AVI, ASF, WMV, 498–501MPEG, 501–2other formats, 502–3
publishing, 504–5shooting, 490–91
software, 485–88capture and playback tools,
487–88drivers, 486nonlinear editing tools, 488
storyboard, 489studio setup, 491timeline, 495titles, 496transitions, 495Video4Linux, 482–83video sequence guide, 489, 490voice-overs and music, 496,
497Videotape, transferring digital
video to, 504vidrec, 492Vinyl record transfer to CDs,
384–95audio system and, 386–87CD creation, 393–94MP3 file creation, 394–95preparation for, 385–86recording, 387–89removing clicks, pops, and
hisses, 389–90trimming tracks, 390–93
“Viral” license, 5Virtual consoles, 76–77Virtual network console. See
VNCVirtual private network (VPN),
274–79client options, 274–77server options, 277–79SSH as, 274–79
Virusesboot sector, 14via e-mail. See GPG (GNU
Privacy Guard)V-mails (video e-mails), 505VNC, 29, 30, 32–43
clients, 41–43environment, 33with Linux, 37–43server, 40–41Xvnc, 34–36
23456789
2222222222333333333344444
INDEX 531
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 531
vncserver, 37–43vncviewer, 41Voice-overs in videos, 496, 497Volume, output, 370–72Volume adjustment, 377–78Voodoo Tracker, 409Vorbis codec, 369
WWavelet transforms, 444WAV format, 368Web browser, remote
monitoring through,185–92
coding, 186–89compiling, 189–91testing, 191–92
Webcams, 484–85Web-clipping application, 330Web-mail service, 157–78
Aeromail installation, 165Aeromail use, 171–75IMAP server, 159–60other software packages,
176PHP4 support, 161–64, 170,
177resources on, 177–78SSL libraries configuration,
161system preparation, 159testing server, 166–70
Web pages, command line toolto retrieve, 300
Web servers. See Apache;Undernets
Web sitesimages on, 437for software, 26for source code, 24as tools, 304–6
wget, 300, 426which (program), 299Window manager, 28–29, 31Windows. See Microsoft
WindowsWindows Media Format, 369Wine, 331, 333–36
AIM client under, 339–40, 345
DirectX under, 345getting, 334MS Word 97 via, 342–43, 346network applications under,
345Quicken under, 346serial- and parallel-port
support, 345Solitaire via, 341Stars! under, 343–44status of, 333–34Total Annihilation under, 345wine.conf, 335–39
WMV files, 501Word 97, under wine, 342–43,
346Workstation replacement,
99–101
World Foundry, 462www.freshmeat.net, 304www.google.com, 24, 305www.jabber.org, 305–6www.linux.com, 304www.linuxdoc.org, 304www.linuxgames.com, 305www.lokigames.com, 305www.lwn.net, 305www.slashdot.org, 305www.sourceforge.net, 305
XX11 forwarding, 271–72X11Forwarding (SSH server
option), 279X-CD-Roast, 359–63xconfig, 18–20, 349XFree86, 11XMMS multimedia player, 303,
371, 382, 414–16, 431,435, 498
xscanimage program, 446X-server
for Windows, 29–30Xvnc as, 34–35
XSMBrowser, 96, 97xv, 303xvncviewer, 41X-windows, 27, 28–29, 31–32,
349
ZzImage kernel, 21
532 INDEX
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 532
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 533
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 534
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 535
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 536
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 537
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 538
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 539
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 540
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 541
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 542
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 543
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 544
23456789
2222222222333333333344444
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 545
4
6
90
4
6
90
4
6
90
4
6
90
4
Also from Addison-Wesley
Linux System AdministrationA User’s GuideMarcel Gagné
0-201-71934-7Paperback560 pages© 2002
This comprehensive, hands-on guide to Linux system administration provides you with the deeperunderstanding of the inner workings of Linux.
The Linux Companion for System Administrators,Second EditionJochen Hein
0-201-67525-0Paperback592 pages© 2001
Focusing on the use of Linux in a private orcorporate environment, this book will help the experienced Linux user attain a more efficient level of system administration.
Understanding Open Source SoftwareDevelopmentJoseph Feller, Brian Fitzgerald
0-201-73496-6Paperback224 pages© 2002
The first complete and objective synthesis of the available literature, offering a unique one-stop reference for developers, researchers, managers and anyone else needing to grasp the key issues about OSS.
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 546
23456789
2222222222333333333344444
Solutions from experts
you knowand trust.
www.informit.com
www.informit.com
OPERATING SYSTEMS
WEB DEVELOPMENT
PROGRAMMING
NETWORKING
CERTIFICATION
AND MORE…
Expert Access.Free Content.
Free, indepth articles and supplements
Master the skills you need,when you need them
Choose from industry leadingbooks, ebooks, and trainingproducts
Achieve industry certificationand advance your career
Get answers when you need them from live experts or InformIT’s comprehensive library
Visit
and get great content
from
Articles Books Expert Q&AFree Library Training News Downloads
Addison-Wesley and InformIT are trademarks of Pearson plc /Copyright©2000 pearson
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 547
4
6
90
4
6
90
4
6
90
4
6
90
4
28747 05 pp. 519-548 r1ah.ps 4/11/02 12:10 PM Page 548