UNIX RENDSZEREK BIZTONSÁGI KÉRDÉSEI

Dr. Krausz Tamás, kuka@dragon.klte.hu
KLTE ISZK

Abstract

This paper is about unix system security. The paper is not intended to be a hacker's guide, it is mainly for system administrators, who are not always alert enough. First, some well known cases were described, then the necessary measures that the system administrartor must consider. The main themes are the following: users and passwords, groups and the superuser, the filesystem, finding suid and sgid files, suspicious accounts, backups, system logging, network security, nfs , kerbereros, secure rpc, firewalls, encryption, phisical security.


EMTP, EGY ÚJ LEVELEZ PROTOKOLL
ÉS IMPLEMENTÁCIÓJA

Iványi Tibor, ivanyit@tigris.klte.hu
Csukás Levente, csukasl@fox.klte.hu
Kossuth Lajos Tudományegyetem Informatikai és Számító Központ

Abstract

The well known SMTP (Simple Mail Transfer Protocol) based mailing systems have security holes. Since the client side can be a simple telnet client, everyone can connect to SMTP servers on port 25. With this method unnamed letters can be sent. To eliminate this problem we define a new protocol, Endpoint Mail Transfer Protocol. This protocol connects the two communicating endpoint directly and includes security checking of letters. It automatically determines the sender's data, uses a privileged port for communication and incereases the security for both the client programs and the server daemons.


SSH - A BIZTONSÁGOS ALTERNATÍVAZ RSH HELYETT

Kadlecsik József, kadlec@sunserv.kfki.hu
KFKI RMKI Számítógép Hálózati Központ

Abstract

More security on Internet usually means greater inconvenience - but ssh is an exception. The features and usage of this excellent tool are detailed with examples from real systems.


HÁLÓZATBIZTONSÁGI TECHNIKÁK AZ EGÉSZSÉGÜGYBEN

Ködmön József, h8628kod@ella.hu
Takács Péter, h8627tak@ella.hu
DOTE Egészségügyi Fõiskolai Kar

Abstract

The lecture is about the controlling and realization of the data safety and data security, and is treating the special features of handling the data in the health care. It is analyzing the security functions of the Novell Netware, the Windows for Workgroups, Windows NT and UNIX operating systems. Is shows some security holes. It offers some rarely applied networking data safety technique, such as NCP packet signature, Kerberos system.