Errata
The errata list is a list of errors and their corrections that were found after the product was released.
The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.
Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted by | Date submitted |
---|---|---|---|---|
Page 1 Capter 11. pag. 374 |
There is a mistake in this section regarding snort parameters: |
Manuel Garc?a-Cervig?n | Apr 25, 2014 | |
Printed | Page 211 4th paragraph |
The command line in the 4th paragraph reads "openssl req ... -keyout cakey.pem -out cakey.pem ..."(with ellipsis for irrelevant parts). |
Anonymous | |
Printed | Page 211 4th paragraph |
The command line in the 4th paragraph reads "openssl req ... -keyout cakey.pem -out cakey.pem ..."(with ellipsis for irrelevant parts). |
Anonymous | Jun 12, 2008 |
Printed | Page 242 Hack 77 bottom of the page |
Hi folks, |
Anonymous | Sep 16, 2008 |
Printed | Page 268 2nd Paragraph (hack 96) Page may differ, hack is the same. (1st Ed) |
One option that the author does not seem to be aware of is a secondary use for the Suspend2 patchset. Not only is it useful to laptop users, it is also useful on servers. This is because of the essential purpose of software suspend: preserve the filesystem and memory, without disturbing processes. By its nature it does no more damage to the filesystem than a cold shutdown (perhaps less, as caches are flushed), and it throws a perfect memory image into the bargain. Add in that it is undetectable during the first portion unless the intruder is watching top studiously, and locks memory immediately after that, it can be used as a remarkably effective snapshotting tool. All that would remain would be to remove the hard drive (as most BIOS'es force resuming from the same drive as was suspended) and image it, for a perfect image of the system in question. It would probably be most effective with the filewriter target, as it eliminates the necessity of hunting through the swap parti! |
Anonymous | |
Printed | Page 303 Paragraph 10 |
The page reads "To disable IP forwarding, run this: |
Anonymous | May 11, 2010 |