## Bibliografía https://www.virtualbox.org/manual/ch06.html#network_hostonly https://juncotic.com/acl-access-control-lists-y-los-permisos-en-gnu-linux/ https://www.josedomingo.org/pledin/ https://www.virtualbox.org/wiki/Linux_Downloads https://app.vagrantup.com/rapid7/boxes/metasploitable3-ub1404 https://cisofy.com/documentation/lynis/#introduction https://computernewage.com/2015/06/14/el-arbol-de-directorios-de-linux-al-detalle-que-contiene-cada-carpeta/ https://elbauldelprogramador.com/entendiendo-los-runlevel-en-debian-y-ubuntu/ https://es.wikipedia.org/wiki/Shellshock_(error_de_software) https://www.xataka.com/basics/firewire-que-que-tipos-hay-cuales-sus-caracteristicas https://weblinus.com/nfs-instalacion-de-servidor-y-cliente/ https://es.wikipedia.org/wiki/Analizador_de_paquetes https://geekflare.com/es/network-packet-analyzers/ https://formacion.intef.es/pluginfile.php/37407/mod_imscp/content/1/instalacin_y_configuracin_del_servidor_de_impresin.html https://docs.kernel.org/admin-guide/index.html https://es.wikipedia.org/wiki/PF_(software) https://www.linode.com/docs/guides/apache-web-server-on-ubuntu-14-04/ https://juanjoselo.wordpress.com/2018/01/06/gestion-de-logs-centralizados-con-rsyslog/2 http://www.sgmendez.com/2018/01/14/logrotate-rotado-automatico-logs-linux/ https://www.hostinger.es/tutoriales/cron-job https://www.raulprietofernandez.net/blog/gnu-linux/como-instalar-un-servidor-de-ntp-en-gnu-linux-ubuntu-server https://lamiradadelreplicante.com/2017/04/27/grsecurity-no-mas-parches-gratis-para-linux/ https://access.redhat.com/documentation/es-es/red_hat_enterprise_linux/8/html/security_hardening/checking-integrity-with-aide_security-hardening https://la-samhna.de/samhain/ https://www.linuxtotal.com.mx/index.php?cont=info_seyre_011 https://wiki.archlinux.org/title/ClamAV_(Espa%C3%B1ol) https://www.ibiblio.org/pub/Linux/docs/LuCaS/Manuales-LuCAS/doc-curso-salamanca-admin-avanzada/html/ch07s03.html https://javierin.com/que-es-la-tecla-sysrq/ https://es.wikipedia.org/wiki/Syslog https://askubuntu.com/questions/420320/what-permissions-would-change-if-i-change-umask-to-027-from-022 https://debian-handbook.info/browse/stable/ https://es.wikipedia.org/wiki/Upstart https://wiki.archlinux.org/title/Core_dump https://wiki.archlinux.org/title/SHA_password_hashes https://www.digitalocean.com/community/tutorials/how-to-edit-the-sudoers-file-es https://usbguard.github.io/ https://www.incibe-cert.es/blog/ciberataques-drdos-basados-el-protocolo-portmapper https://wiki.ubuntu.com/IPv6 https://structio.sourceforge.net/guias/AA_Linux_colegio/kernel-y-modulos.html https://man.openbsd.org/sshd_config https://unix.stackexchange.com/questions/56941/what-is-the-point-of-sshd-usedns-option https://www.tecmint.com/install-rsyslog-centralized-logging-in-centos-ubuntu/ https://betterstack.com/community/guides/logging/how-to-configure-centralised-rsyslog-server/ https://www.networkworld.com/article/3571465/managing-process-accounting-on-linux.html https://ubunlog.com/systat-herramienta-monitorizar-ubuntu/ https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-defining_audit_rules_and_controls https://www.wikiwand.com/es/Entrop%C3%ADa_(computaci%C3%B3n) https://unixhealthcheck.com/blog?id=472 https://www.incibe-cert.es/alerta-temprana/vulnerabilidades https://hackaday.com/2017/11/02/what-is-entropy-and-how-do-i-get-more-of-it/ https://edk2-docs.gitbook.io/security-advisory/honoring_memory_only_reset_control_and_correct_mor https://www.incibe.es/protege-tu-empresa/blog/son-y-sirven-los-siem-ids-e-ips https://cybersecurity.att.com/blogs/security-essentials/open-source-intrusion-detection-tools-a-quick-overview https://www.comparitech.com/net-admin/ips-tools-software/ https://man7.org/linux/man-pages/man7/capabilities.7.html http://www.it.uc3m.es/amarin/curs/lao/node58.html ### Libros - Título: "Linux, Dominar la administración del sistema", Editorial: "ENI", Autor: "Sébastien Rohaut". - Título: "Linux, Adminitración avanzada de servidores", Editorial: "ENI", Autor: "Philippe Pinchon".