Members Area
|
This is the members area.Right now only the list of the topics that we will cover in June/July 2002 is presented here. Very soon all the links will be active and you will be able to download the material directly from the site. In the mean time, just to encourage the scientist in everyone, take your time out and mail me useful information regarding the topics listed below. very soon this area will be password protected and access will be restricted to the SIG members only |
| A. Linux | |
| Part 1 Introduction and Installation of Red Hat Linux | Part 2 Configuring Services |
| Introduction to Unix and Red Hat Linux | System startup and shutdown |
| Installation of Red Hat Linux | SMTP and other protocols (POP3, IMAP) |
| Basic Configuration | FTP |
| Configuring LILO, GRUB | Apache Web Server |
| Configuring X Windows | NNTP Server (Internet News Server) |
| Configuring GNOME Environment | Domain Name Service (DNS) |
| Network File System (NFS) | |
| Samba Server | |
| Part 3 System Administration And Management | Part 4 Programming in Linux |
| File Systems, Disk and other Devices | Shell Programming |
| Printing with Linux | Gawk programming |
| TCP/IP Network Management | Automating Task |
| Connecting To Internet | Configuring and Building Kernels |
| Red Hat Graphical Administration Tools | Network Programming |
| Essential System Administration | C and C++ Programming |
| Backup and Restore | Perl Programming |
| System Security | Motif Programming |
| Tcl and tk Programming | |
| Programming in Python | |
| Java Programming |
B. Below is the list of Security related
topics that we'd be studying
|
1 - Intro to security threats 2 - Famous security incidents 3 - Reasons of these incidents 4 - Detail protocols study - protocol structure,
arch., state machine, weakness, dependencies, vulnerabilities 7 - Attacks by exploiting protocol weakness - study,
analysis, counter measures 8 - Vulnerability in code due to poor programming
practices 9 - Study of famous information systems that have
vulnerabilities 10 - Programming in C/C++ & Java to build exploits and hacking tools 11 - How to test applications against known and unknown vulnerabilities 12 - Complex intrusion intention analysis - attack patterns, strategy, unusual activities ... |
13 - Cryptography 24 - Intrusion detection system 25 - PROJECT - SFD-TIDS |
[SIGDC Executive Council | ACM CS KU | Other SIG's | Webmaster]