Updates and Errata for Real World Linux Security, Second Edition
This page contains the official updates and errata for the book
Real World Linux Security: Intrusion Prevention, Detection, and Recovery,
Second Edition
(RWLS2) by Bob Toxen, published by Prentice Hall Ptr Copyright 2003.
To learn more about the book (including independent reviews, interviews with
the author, and mention of it in the media), how to purchase it,
and how to get on the mailing list, please see the book home page at
http://www.realworldlinuxsecurity.com.
This page is for the readers of RWLS2 and is maintained by:
Horizon Network Security,
your expert source in Linux and UNIX security.
We can solve your security needs, including firewalls,
Virus and spam filters,
hardening systems,
security audits,
24x7 system monitoring and problem response,
Linux System Administration,
Virtual Private Networks (VPNs), Routers,
redundant hardwdare, redundant Internet connections,
and more.
Errata
Several of the author's programs are offered that are written in the C
language. To compile any of these into an executable (binary) program,
for example, ports.c, do the following.
Create or cd to a directory to work in (avoid a publicly writable directory such as /tmp). Copy the source file, ports.c, into that directory.
Issue the following command to compile the program
make ports
or invoke the C compiler directly with the command
cc -o ports ports.c
Test it before installation, if desired, via
./ports [args]
Give it safe permissions with
chmod 755 ports
Install it as root in a public directory, if desired, via
su
cp ports /usr/local/bin/ports
Exit the root shell
exit
If using tcsh or csh, give the command
rehash
For shell scripts, that have the extension of .sh or .csh, use a procedure
that is similar to that of C programs. The difference is that instead of
the make blockip step, copy to the executable name with the command
cp blockip.csh blockip
and then add execute permission with the command
chmod +x blockip
Maintained by
book@verysecurelinux.com
Copyright 2003-2006 Horizon Network Security, except quoted material. All rights reserved.
Last updated on 08/23/2006.
Return to Real World Linux Security Home Page.