Difference between revisions of "ISXUbuntu/Documentation"
From Wiki
m (ISXUbuntu/Developers moved to ISXUbuntu/Documentation) |
|
(No difference)
|
Revision as of 12:18, 27 August 2008
Contents
ISXUbuntu Developers page
Documentation
Right now the documentation is just a bare outline that needs to be filled in.
Developer Documentation
- How to build an iso
- How to run and test
- Using xen
- chroot
- How to create a package file
- How to create a package file for mozilla plugins
End user documentation
What ISXUbuntu is, and how to use it
- What Ubuntu is, and how ISXUbuntu differs
- How to harden a standard Ubuntu distribution to be like ISXUbuntu
- Additional security measures we didn't include in ISXUbuntu
How the internet works and why you should care
- IP
- What IP is
- Brief History
- TCP, UDP
- IP security issues
- Snooping on ethernet
- ethernet arp spoofing
- man in the middle attacks, ethernet arp spoofing
- ip routes can be hijacked (like what happened to youtube)
- tcp sequence guessing (Is this a big deal? I'm not sure)
- What IP is
- DNS
- What dns is
- Brief history
- DNS security issues
- your local dns could be hijacked to point you to fake sites
- some viruses install entries in the windows hosts file
- your local dns could be cache poisoned
- What dns is
- Domains
- can be fake
- or typo domains
- or have been taken over when lapsed
- or simply stolen (like what happened to comcast)
- Using a browser smartly :
- how to tell if you are using an encrytped session (some people believe lock icons on the page itself even if the browser is showing an unlocked lock).
- What browser warning certificate warning messages mean
- Cross site scripting (how do browser users defend against this?)
- How cookies allow sites like doubleclick to track you from site to site
- Privacy Policies: They can say that a company will sell your information to whoever will pay for it (examples?)
- Smart shopping: Using paypal, secure code, temporary credit card numbers
- Information to protect: Don't give out your social security number online! (what else?)
How your computer works, and why you should care
- What a program
- The viruses of the DOS era
- Word macro viruses
- Modern malware
- How the linux file permission module protects you
- Will prevent system wide programs from being overwritten by users and the programs they run
- Will not protect your home directory
- How phishers get people to run malware programs