Skip to content

Network Security Hacks Tips and Tools for Protecting Your Privacy

Spend $50 to get a free DVD!

ISBN-10: 0596527632

ISBN-13: 9780596527631

Edition: 2nd 2006 (Revised)

Authors: Andrew Lockhart

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. The new edition of Network Security Hacks offers 100 concise and practical hacks, including more information for Windows administrators, hacks for…    
Customers also bought

Book details

List price: $39.99
Edition: 2nd
Copyright year: 2006
Publisher: O'Reilly Media, Incorporated
Publication date: 11/9/2006
Binding: Paperback
Pages: 352
Size: 6.00" wide x 9.00" long x 1.25" tall
Weight: 1.364
Language: English

Unix Host Security
Secure Mount Points
Scan for SUID and SGID Programs
Scan for World- and Group-Writable Directories
Create Flexible Permissions Hierarchies with POSIX ACLs
Protect Your Logs from Tampering
Delegate Administrative Roles
Automate Cryptographic Signature Verification
Check for Listening Services
Prevent Services from Binding to an Interface
Restrict Services with Sandboxed Environments
Use proftpd with a MySQL Authentication Source
Prevent Stack-Smashing Attacks
Lock Down Your Kernel with grsecurity
Restrict Applications with grsecurity
Restrict System Calls with systrace
Create systrace Policies Automatically
Control Login Access with PAM
Restrict Users to SCP and SFTP
Use Single-Use Passwords for Authentication
Restrict Shell Environments
Enforce User and Group Resource Limits
Automate System Updates
Windows Host Security
Check Servers for Applied Patches
Use Group Policy to Configure Automatic Updates
List Open Files and Their Owning Processes
List Running Services and Open Ports
Enable Auditing
Enumerate Automatically Executed Programs
Secure Your Event Logs
Change Your Maximum Log File Sizes
Back Up and Clear the Event Logs
Disable Default Shares
Encrypt Your Temp Folder
Back Up EFS
Clear the Paging File at Shutdown
Check for Passwords That Never Expire
Privacy and Anonymity
Evade Traffic Analysis
Tunnel SSH Through Tor
Encrypt Your Files Seamlessly
Guard Against Phishing
Use the Web with Fewer Passwords
Encrypt Your Email with Thunderbird
Encrypt Your Email in Mac OS X
Firewall with Netfilter
Firewall with OpenBSD's PacketFilter
Protect Your Computer with the Windows Firewall
Close Down Open Ports and Block Protocols
Replace the Windows Firewall
Create an Authenticated Gateway
Keep Your Network Self-Contained
Test Your Firewall
MAC Filter with Netfilter
Block Tor
Encrypting and Securing Services
Encrypt IMAP and POP with SSL
Use TLS-Enabled SMTP with Sendmail
Use TLS-Enabled SMTP with Qmail
Install Apache with SSL and suEXEC
Secure BIND
Set Up a Minimal and Secure DNS Server
Secure MySQL
Share Files Securely in Unix
Network Security
Detect ARP Spoofing
Create a Static ARP Table
Protect Against SSH Brute-Force Attacks
Fool Remote Operating System Detection Software
Keep an Inventory of Your Network
Scan Your Network for Vulnerabilities
Keep Server Clocks Synchronized
Create Your Own Certificate Authority
Distribute Your CA to Clients
Back Up and Restore a Certificate Authority with Certificate Services
Detect Ethernet Sniffers Remotely
Help Track Attackers
Scan for Viruses on Your Unix Servers
Track Vulnerabilities
Wireless Security
Turn Your Commodity Wireless Routers into a Sophisticated Security Platform
Use Fine-Grained Authentication for Your Wireless Network
Deploy a Captive Portal
Run a Central Syslog Server
Steer Syslog
Integrate Windows into Your Syslog Infrastructure
Summarize Your Logs Automatically
Monitor Your Logs Automatically
Aggregate Logs from Remote Sites
Log User Activity with Process Accounting
Centrally Monitor the Security Posture of Your Servers
Monitoring and Trending
Monitor Availability
Graph Trends
Get Real-Time Network Stats
Collect Statistics with Firewall Rules
Sniff the Ether Remotely
Secure Tunnels
Set Up IPsec Under Linux
Set Up IPsec Under FreeBSD
Set Up IPsec in OpenBSD
Encrypt Traffic Automatically with Openswan
Forward and Encrypt Traffic with SSH
Automate Logins with SSH Client Keys
Use a Squid Proxy over SSH
Use SSH As a SOCKS Proxy
Encrypt and Tunnel Traffic with SSL
Tunnel Connections Inside HTTP
Tunnel with VTun and SSH
Generate VTun Configurations Automatically
Create a Cross-Platform VPN
Tunnel PPP
Network Intrusion Detection
Detect Intrusions with Snort
Keep Track of Alerts
Monitor Your IDS in Real Time
Manage a Sensor Network
Write Your Own Snort Rules
Prevent and Contain Intrusions with Snort_inline
Automatically Firewall Attackers with SnortSam
Detect Anomalous Behavior
Automatically Update Snort's Rules
Create a Distributed Stealth Sensor Network
Use Snort in High-Performance Environments with Barnyard
Detect and Prevent Web Application Intrusions
Scan Network Traffic for Viruses
Simulate a Network of Vulnerable Hosts
Record Honeypot Activity
Recovery and Response
Image Mounted Filesystems
Verify File Integrity and Find Compromised Files
Find Compromised Packages
Scan for Rootkits
Find the Owner of a Network