Updates and Errata for Real World Linux Security, Second Edition

This page contains the official updates and errata for the book Real World Linux Security: Intrusion Prevention, Detection, and Recovery, Second Edition (RWLS2) by Bob Toxen, published by Prentice Hall Ptr Copyright 2003.

To learn more about the book (including independent reviews, interviews with the author, and mention of it in the media), how to purchase it, and how to get on the mailing list, please see the book home page at http://www.realworldlinuxsecurity.com.

This page is for the readers of RWLS2 and is maintained by:

Horizon LogoHorizon Network Security, your expert source in Linux and UNIX security. We can solve your security needs, including firewalls, Virus and spam filters, hardening systems, security audits, 24x7 system monitoring and problem response, Linux System Administration, Virtual Private Networks (VPNs), Routers, redundant hardwdare, redundant Internet connections, and more.


Errata
Several of the author's programs are offered that are written in the C language. To compile any of these into an executable (binary) program, for example, ports.c, do the following.

     Create or cd to a directory to work in (avoid a publicly writable directory such as /tmp). Copy the source file, ports.c, into that directory.

     Issue the following command to compile the program

          make ports

     or invoke the C compiler directly with the command

          cc -o ports ports.c

     Test it before installation, if desired, via

          ./ports [args]

     Give it safe permissions with

          chmod 755 ports

     Install it as root in a public directory, if desired, via

          su

          cp ports /usr/local/bin/ports

     Exit the root shell

          exit

     If using tcsh or csh, give the command

          rehash


For shell scripts, that have the extension of .sh or .csh, use a procedure that is similar to that of C programs. The difference is that instead of the make blockip step, copy to the executable name with the command

          cp blockip.csh blockip

and then add execute permission with the command

          chmod +x blockip


Maintained by book@verysecurelinux.com
Copyright 2003-2006 Horizon Network Security, except quoted material. All rights reserved.
Last updated on 08/23/2006.

Return to Real World Linux Security Home Page.