UNIX Hints & Hacks

ContentsIndex

Appendix D: Administration Tools and Recommended Organizations

 

Previous ChapterNext Chapter

Sections in this Chapter:

   

System Administration Tools

       

Networking Tools

       

Recommended Organizations

 

   

 

 

Networking Tools

Security Tools

Argus  The Argus documentation describes this as "a powerful tool for monitoring IP networks. It provides tools for sophisticated analysis of network activity that can be used to verify the enforcement of network security policies, network performance analysis and more." ftp://ftp.sei.cmu.edu/pub/argus

Arpwatch   Arpwatch is described in the readme file as "an ethernet monitor program that keeps tracks of ethernet/IP address pairings." ftp://ftp.ee.lbl.gov

Big Brother   A Web based Unix network monitoring and notification system. http://www.iti.qc.ca/iti/users/sean/bb-dnld/

Dig  A network utility that queries Domain Name Servers similar to nslookup but is much more flexible. ftp://venera.isi.edu/pub/

GASH  Automates NIS and DNS administration, and allows a number of administrators to share authority over user accounts, account groups, e-mail aliases, and network systems. GASH provides a secure and centralized form of administration. (from the GASH Web site at http://www.arlut.utexas.edu/csd/gash_docs/gash.html)

Samba  Will allow Windows for Workgroups 3.11 clients, Windows NT clients and OS/2 clients to mount a Unix filesystem and send to printers attached to the unix systems. This is a must for connectivity between the PC's and Unix environment. http://www.samba.org

Traceroute  Traces the route IP packets take from the current system to a destination system. This is a useful tool in finding the location of a network failure. ftp://ftp.psc.edu/pub/net_tools/

Security Tools

Cops  A set of programs that check a different aspect of security on a UNIX system. If any potential security holes do exist, the results are either mailed or saved to a report file. ftp://ftp.cert.org/pub/tools/cops

crack  A program designed to find standard Unix eight-character DES encrypted passwords by standard guessing techniques. ftp://ftp.cert.org/pub/tools/crack

Gabriel  A SATAN detector. Gabriel gives the system administrator an early warning of possible network intrusions by detecting and identifying network probing. (from the Los Altos Technologies Web site at http://www.lat.com/gabe.htm)

IP Filter   The IP Filter Web site describes this as "a TCP/IP packet filter, suitable for use in a firewall environment." http://cheops.anu.edu.au/~avalon/ip-filter.html

ISS  Checks hosts within a specified range of IP address for various security vulnerabilities in sendmail, anonymous FTP setup, NFS and many more. ftp://info.cert.org/pub/tools/iss/

SATAN  The SATAN Home page describes this as "a tool to help systems administrators. It recognizes several common networking-related security problems, and reports the problems without actually exploiting them." http://www.fish.com/satan/

Shadow  This package including everything that is necessary to use shadow password file. ftp://ftp.cs.widener.edu/pub/src/adm

SSH (Secure Shell)   An enhance versions of rlogin, rsh and rcp that provides RSA authentication and encryption of communications as well as many other security improvements. This program has export restrictions for US, France, Russia and possibly other countries. http://www.cs.hut.fi/ssh

Sudo (superuser do)  "Allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments." (from the Sudo Web site at http://www. courtesan.com/sudo/ )

Tiger  Scans a system for potential security problems. ftp://wuarchive.wustl.edu/packages/security/TAMU/

Tripwire  Monitors system for security break-in attempts. ftp://ftp.cert.org/pub/tools/tripwire/

Wu-ftpd  A replacement ftp server for UNIX systems that many features including extensive logging and a way of limiting number of ftp users. ftp://wuarchive.wustl.edu/packages/wuarchive-ftpd/

UNIX Hints & Hacks

ContentsIndex

Appendix D: Administration Tools and Recommended Organizations

 

Previous ChapterNext Chapter

Sections in this Chapter:

   

System Administration Tools

       

Networking Tools

       

Recommended Organizations

 

   

 

 

© Copyright Macmillan USA. All rights reserved.