Text Files - Section 5 - Unix & Linux

Backdoors - By Christopher Klaus 8/4/97
Who or What Is Root?
Basic Local/Remote Unix Security for Unix Newbies
SecureLinux for Newbies v.1.1
Complete Linux Loadable Kernel Modules
Telnet stuff (commands, stories ...)
The Beginners Guide To Linux v1.1
Covering traces 1.
Covering traces 2.
An Introduction To Hacking Around With The UNIX Operating System
A Beginners Introduction To Hacking Around On The UNIX Operating System - Part II
Some basic unix commands
Networking for Lazy Dipshits: Volume 1 - Win95/98 & Win95/98 CAT5 Ethernet
UNIX file system by type-0
Unix bible - great manual for all *nix newbies
Introduction to the Log Files in a Unix System
The Shadowed Passwd
Linux Shadow Password HOWTO
Linux Modes (chmod)
How to automate your log filtering - Watching Your Logs
Secure UNIX Programming FAQ (v. 0.3)
Netcat (Unix utility) guide
Another Paper on Linux Security (Bronc Buster)
Basic Unix Information
UNIX Security (By Rajib K. Mitra)
Linux Info: Part 1 The Basics
Linux Info: Part 2 - Closing Ports, Restricting Telnet Access, Firewall, PPP
Most Useful UNIX hack commands,and hints on their usage
Suid Shells
Learn UNIX basics (vi,csh,system conf. ...)

WARNING! READ CAREFULLY! This cd-rom contains information and tools that can be used to exploit computer and network security. The primary purpose of this CD-ROM is to aid security professionals in combating the tools and techniques used by malicious hackers. Under no circumstances should this CD-ROM be used to illegally circumvent computer or network security.