Can anyone briefly describe the difference between PASV ftp vs. non-PASV
(regular? active?) with reguards to how the ports get assigned?
What considerations on firewalls (any brand) need to made when
distinguishing between the two?
The way I understand regular FTP, the client connects to server on port 21
then the server connects back to client on 20 with the data. Is this correct
and how is PASV different?
-erik
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Claussen, Ken
Sent: Wednesday, May 30, 2001 11:39 AM
To: 'Graham, Randy (RAW) '; '[EMAIL PROTECTED]'
Subject: RE: Recommended readings
comments inline...
Ken Claussen MCSE CCNA CCA
[EMAIL PROTECTED]
"The Mind is a Terrible thing to Waste!"
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Graham, Randy (RAW)
Sent: Wednesday, May 30, 2001 10:38 AM
To: '[EMAIL PROTECTED]'
Subject: Recommended readings
Well, I posted this last week but have since gotten a few requests for it,
so I wanted to post this again. Following is the starting list I give to
people when they ask me for book suggestions. My personal library is much
more than this, and I can certainly recommend more books than what I list
here. However, this is what I give to people as a starter if they aren't
really sure what they want to learn. I'm open to suggestions for additions
or removals.
I recommend anyone buying books online start with http://www.bookpool.com/
and http://www.bestbookbuys.com/ for purchases in the USA. Outside the US,
I don't know what sites are best for shopping.
----------
Firewalls:
----------
Building Internet Firewalls - Zwicky, et al
KC> The first edition is good, but a bit outdated (now), however the second
edition is an excellent resource to begin building a framework for any type
of firewall architecture. It includes information about NT, Linux, and Unix
primarily.
IDS:
----
Network Intrusion Detection: An Analysts' Handbook - Northcutt
Intrusion Signatures and Analysis - Northcutt
KC> An excellent resource, I highly recommend this book as well for all
security minded individuals!
Networking:
-----------
TCP/IP Illustrated, Volume I- Stevens, Wright
Internetworking with TCP/IP, Volume I - Comer
Computer Networks - Tanenbaum
KC> I agree both excellent texts.
Vulnerability Testing:
----------------------
Hacking Exposed - Scambray, et al
KC> This text is quite old now( Copyright 1998 I beleive), but an excellent
resource for anyone who want lots of background into all of the different
attacks and ways to counteract them. I wish they would come out with a
second edition to include many of the new exploits.
General Security:
-----------------
Practical Unix and Internet Security - Garfinkel, Spafford
KC> Cisco IOS security, Cisco Press is an excellent resource for general
Cisco Router security.
Cryptography:
-------------
Applied Cryptography - Schneier
Web sites:
----------
http://www.google.com/ -- excellent search engine
http://www.securityfocus.com/ -- security news and education
http://www.sans.org/ -- security training and reading
KC> www.cert.org an excellent resource for current information on exploits
and attacks.
---------
Randy Graham
--
You're kind of trying to pick between "horible disaster" and "attrocious
disaster" -- Paul D. Robertson (on VNC vs. PPTP)
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]