Index

Symbols

! (logical NOT) operator
matching IP addresses and ports for Snort rules, Write Your Own Snort Rules
TCP flag matching, Snort rules, Write Your Own Snort Rules
* operator, TCP flag matching in Snort rules, Write Your Own Snort Rules
+ operator, TCP flag matching in Snort rules, Write Your Own Snort Rules
-> (direction operator), in Snort rules, Write Your Own Snort Rules
-nolisten tcp option for startup commands, Prevent Services from Binding to an Interface
../ character sequence in requests, Detect and Prevent Web Application Intrusions
.rej files, finding, Lock Down Your Kernel with grsecurity
/dev/mem and /dev/kmem, preventing access to, Protect Your Logs from Tampering
/proc directory, restricting access with grsecurity, Lock Down Your Kernel with grsecurity
: (colon), in port ranges for Snort rules, Write Your Own Snort Rules
<> (direction operator), in Snort rules, Write Your Own Snort Rules
| character
enclosing hexadecimal vales in Snort rules, Write Your Own Snort Rules
searching on multiple variables, Detect and Prevent Web Application Intrusions

A

ac command (process accounting), Log User Activity with Process Accounting
Accept header, logging requests without, Detect and Prevent Web Application Intrusions
accept option, SnortSam, Automated Dynamic Firewalling with SnortSam
access.conf file (pam_access module), Control Login Access with PAM
ACID (Analysis Console for Intrusion Databases), Keep Track of Alerts, Keep Track of Alerts
archiving database, configuring, Keep Track of ...

Get Network Security Hacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.