Network security hacks tips & tools for protecting your privacy
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second editi...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Sebastopol, California :
O'Reilly
2007.
|
Edición: | 2nd ed |
Colección: | Hacks series
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627214706719 |
Tabla de Contenidos:
- Network Security Hacks; Credits; Contributors; Acknowledgments; Preface; How This Book Is Organized; Conventions Used in This Book; Safari Enabled; Using Code Examples; How to Contact Us; Got a Hack?; 1. Unix Host Security; 2. Scan for SUID and SGID Programs; 3. Scan for World- and Group-Writable Directories; 4. Create Flexible Permissions Hierarchies with POSIX ACLs; Managing ACLs; 5. Protect Your Logs from Tampering; 6. Delegate Administrative Roles; 7. Automate Cryptographic Signature Verification; 8. Check for Listening Services; 9. Prevent Services from Binding to an Interface
- 10. Restrict Services with Sandboxed EnvironmentsUsing FreeBSD's jail( ); 11. Use proftpd with a MySQL Authentication Source; 12. Prevent Stack-Smashing Attacks; 13. Lock Down Your Kernel with grsecurity; Configuring Kernel Options; Medium security; High security; Customized security settings; 14. Restrict Applications with grsecurity; 15. Restrict System Calls with systrace; 16. Create systrace Policies Automatically; 17. Control Login Access with PAM; Restricting Access by Time; 18. Restrict Users to SCP and SFTP; Configuring chroot( ); 19. Use Single-Use Passwords for Authentication
- S/Key Under OpenBSD20. Restrict Shell Environments; 21. Enforce User and Group Resource Limits; 22. Automate System Updates; 2. Windows Host Security; See Also; 24. Use Group Policy to Configure Automatic Updates; Digging Deeper; 25. List Open Files and Their Owning Processes; 26. List Running Services and Open Ports; 27. Enable Auditing; 28. Enumerate Automatically Executed Programs; 29. Secure Your Event Logs; 30. Change Your Maximum Log File Sizes; 31. Back Up and Clear the Event Logs; Running the Hack; 32. Disable Default Shares; 33. Encrypt Your Temp Folder; 34. Back Up EFS
- Restoring EFS KeysBacking Up Recovery Agent Keys; 35. Clear the Paging File at Shutdown; 36. Check for Passwords That Never Expire; Running the Hack; 3. Privacy and Anonymity; Installing Tor; Installing Privoxy; Configuring Privoxy for Tor; See Also; 38. Tunnel SSH Through Tor; 39. Encrypt Your Files Seamlessly; 40. Guard Against Phishing; Installing SpoofGuard; How SpoofGuard Works; 41. Use the Web with Fewer Passwords; Remote PwdHash; 42. Encrypt Your Email with Thunderbird; Providing a Public/Private Key Pair; Generating a new key pair; Sending and Receiving Encrypted Email
- 43. Encrypt Your Email in Mac OS XCreating a GPG Key; Installing GPGMail; Sending and Receiving Encrypted Email; 4. Firewalling; Rule Examples; A Word About Stateful Inspection; Ordering Rules; 45. Firewall with OpenBSD's PacketFilter; Global Options; Traffic Normalization Rules; Filtering Rules; 46. Protect Your Computer with the Windows Firewall; Tracking Firewall Activity with a Windows Firewall Log; Problems with Email and the Windows Firewall; Hacking the Hack; See Also; 47. Close Down Open Ports and Block Protocols; 48. Replace the Windows Firewall; The Configuration Wizard
- Manual Configuration