Literaturverzeichnis

1 Dr.Ing. Christian Fill
Gut gerüstet, InformationWeek, Heft 19. August 1999, Seite 15ff

2 D. Brent Chapman und Elizabeth D. Zwicky
Building Internet Firewalls, O'Reilly, ISBN 1-56592-124-0, 1. Auflage, September 1995, Kapitel 4-7

3 Simson Garfinkel und Gene Spafford
Practical UNIX & Internet Security, 2nd Edition, O'Reilly, ISBN 1-56592-148-8, 2. Auflage, April 1996, Kapitel 2,13,16,21

4 Bundesamt für Sicherheit in der Informationstechnik
IT-Grundschutzhandbuch 1999,

5 Mark Grennan
Firewalling and Proxy Server HOWTO v0.67, 26. September 1999, http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html

6 Kevin Fenzi, Dave Wreski
Linux Security HOWTO v1.0.2, Kapitel 8: Network Security, 25. April 1999, http://www.linuxdoc.org/HOWTO/Security-HOWTO.html

7 Lance Spitzner
Armoring Linux, 25. Oktober 1999, http://www.enteract.com/~lspitz/linux.html

8 Network Working Group
RFC 1918, Address Allocation for Private Internets, Februar 1996, http://www.ietf.org/rfc/rfc1918.txt

9 Paul Russell, RustCorp IT Consulting
IPChains, http://www.rustcorp.com/linux/ipchains/

10 Paul Russell
Linux IPChains - HOWTO, 12. März 1999, http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html

11 mehrere Mitglieder der Internetgemeinde
Squid, http://squid.nlanr.net/

12 Duane Wessels
Squid FAQ, Transparent Caching/Proxying, http://squid.nlanr.net/Doc/FAQ/FAQ-17.html

13 Network Working Group
RFC 2411, IP Security, November 1998, http://www.ietf.org/rfc/rfc2411.txt

14Solar Designer
scanlogd, http://www.openwall.com/scanlogd/

15 Dr. Eugene Spafford, Gene Kim, Tripwire, Inc.
tripwire, http://www.tripwiresecurity.com/

16Wietse Venema und Dan Farmer
SATAN, http://www.fish.com/~zen/satan/satan.html

17World Wide Digital Solutions, Inc.
SAINT, http://www.wwdsi.com/saint/

18hobbit@avian.org
NetCat, AvianResearch, http://www.avian.org/

19The "Nessus" Project
Nessusd, http://www.nessus.org/

20Northwest Performance Software, Inc.
NetScan Tools, http://www.nwpsw.com/

21Ipswitch, Inc.
WS_Ping, http://www.ipswitch.com/

22 Carnegie Mellon University
Steps for Recovering from a UNIX Root Compromise, 1. April 1998, http://www.cert.org/tech_tips/root_compromise.html