User-mode Linux and Security


Click here to start

Table of contents

title

intro

blocks

honeypot1

honeypot2

honeypot3

honeypot4

honeypot5

UML honeypot1

UML honeypot

Logging

Forensics

UML honeypot2

jailing

sandboxing

environment

Conclusion

Author: Jeff Dike

E-mail: jdike (at) karaya (dot) com

Homepage: http://user-mode-linux.sourceforge.net

Further information:
This talk was prepared for and delivered at the New England NetSec Professional's Roundtable on May 17, 2002 at Dartmouth College.

Best viewed with
StarOffice

Download presentation