List of Exercises
Chapter 7:
Denial of Service Attacks
Exercise 7-1:
Find Files with setuid Permissions
Exercise 7-2:
Disable Executable Stacks and Enable Stack Message Logging
Exercise 7-3:
Disable the Post Office and Internet Mail Access Protocols
Chapter 10:
Fundamentals of Access Control
Exercise 10-1:
Find Files with setuid Permissions
Exercise 10-2:
Disable Executable Stacks and Enable Stack Message Logging