Achei o conteúdo Muito produtivo mesmo sendo antigo: " Version 1.0, Last modified 18th May, 1999 " O conteudo original é da ( Internet Crime Forum - http://www.internetcrimeforum.org.uk/ ) fonte: LINX Traceability Best Practice Document ;
CONTENTS
- Introduction
- Disclaimers
- Overview
- IP Addresses 4.1 Source addresses are usually valid 4.2 Source address spoofing 4.3 Source routed packets
- Locating the machine
5.1 Registries
5.2 Reverse DNS
5.2 Traceroute
5.4 Access controls - Identifying the machine
6.1 Shared IP addresses
6.1 Dialup access - Identifying dial up accounts
7.1 Identifying accounts from login and logout records
7.2 Other identification techniques
7.3 Final remarks on identifying dialup accounts - Ownership of accounts
8.1 The ident protocol
8.2 Ownership
8.3 Password identification
8.4 Anonymous accounts - Identifying users 9.1 User identification technique - name and address 9.2 User identification technique - credit card check 9.3 User identification technique - telephone call back 9.4 User identification technique - client certificates 9.5 "Free" services
- Caller line identification 10.1 Types of CLI 10.2 Recording of CLI 10.3 Using CLI to prevent anonymous access
- Logging and audit trails 11.1 Ageing and archiving 11.2 Data protection requirements 11.3 Other information
- Domain Name System
- Security 13.1 Use secure software 13.2 Restrict access to machines 13.3 Correct staff account handling 13.4 Testing the system
- Email traceability 14.1 Why traceability is important 14.2 The "Received" header in email 14.3 Fixing email systems to provide tracing information
- Usenet traceability 15.1 News article headers 15.2 Mail-to-news gateways
- Chat Services 16.1 Internet Relay Chat (IRC)
A. Glossary
Forte abraço []'s
0 comentários:
Postar um comentário