Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
» Number of reviews : 5 - viewing 10 Per Page
Last Review by Capt_Caveman - posted: 12-15-2004 12:48 AM
For those not familiar with the O'Reilly "Hacks" series, these are organized as a number of 1-3 page tutorials, each focusing on a very specific topic that are then grouped into larger "chapters". The key point being that they are not comprehensive manuals, but rather a loose assortment of "Tips & Tricks". So if you're a security newbie looking for a basic manual or a skilled admin trying to find a BIND compendium, then this probably isn't the right book for you.
That being said, the Network Security Hacks book has some really great walk-throughs to get you started on those projects that "you've really wanted to do, but never new how" like setting up IPSec, kernel-hardening with grsecurity, setting up keyless SSH logins, and automating Snort. It also covers some of the more basic topics like checking for running daemons with netstat, basic iptables and pf stuff.
One interesting feature of this book that set it apart was that it was fairly multi-platform, with sections covering Windows, BSD, and Linux.
It also has a fairly sizeable section devoted to Snort and covers topics like Snort inline, barnyard, deploying distributed Snort sensors, as well as others.
In general I would highly recommend any of the books in the "Hacks" series, including this one.
Been reading this for awhile. Has a good mix of articles on production-grade stuff (MySQL clustering, BerkleyDB, Grid computing) and things the average home user will find usefull (stream mp3s, use yum, iptables GUIs). The Tech Support section is surprisingly well written and the author is clearly genius.
Product Details: "Linux Magazine" by jeremy - posted: 03-29-2004 - Rating: 7.00
Last Review by Capt_Caveman - posted: 05-11-2004 07:37 PM
Despite the fact that this book is getting a bit outdated, it does manage to cover a wide range of security topics that many of the others skip completely. It's also written in a fairly entertaining style, so it's relatively easy to read despite its size. Covers alot of important newbie details like the reasoning for multiple partitions, tcp_wrappers, turning off services, etc. Some of the exploits and security tools are getting a bit old, so hopefully a new edition will be released soon. In general though, I would recommend this book to people looking to get some basic introductory security knowledge and aren't looking for a book describing the most bleeding-edge tools or exploits.
Product Details: "Maximum Linux Security Second Edition" by Capt_Caveman - posted: 03-23-2004 - Rating: 7.00
Last Review by Capt_Caveman - posted: 02-11-2004 09:39 PM
This book is 520 pages devoted entirely to SSH! It includes detailed coverage the history of SSH and the underlying network and cryptographic mechanisms which make up the SSH protocol. It also shows you in fairly explicit detail how to set up everything from password-less logins to complex encryption tunneling schemes. If you use SSH alot and find yourself wishing you could fully utilize it's features, this book is for you.
Product Details: "SSH The Secure Shell: The Definitive Guide" by Capt_Caveman - posted: 02-11-2004 - Rating: 8.50
Last Review by Capt_Caveman - posted: 02-11-2004 08:52 AM
As the description states, this book is not a comprehensive manual on securing a Linux system from the ground up. So it's not recommended for a security newbie looking for a basic manual or security HOWTO. What it does provide are a series of handy tips and techniques on hardening your systems security. This book is packed with really powerfull tips that even a seasoned sysadmin would find usefull.