Network Security Hacks
Home > Computing and Information Technology > Computer security > Data encryption > Network Security Hacks
Network Security Hacks

Network Security Hacks

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.

Table of Contents:
Credits Preface Chapter 1. Unix Host Security 1. Secure Mount Points 2. Scan for SUID and SGID Programs 3. Scan For World- and Group-Writable Directories 4. Create Flexible Permissions Hierarchies with POSIX ACLs 5. Protect Your Logs from Tampering 6. Delegate Administrative Roles 7. Automate Cryptographic Signature Verification 8. Check for Listening Services 9. Prevent Services from Binding to an Interface 10. Restrict Services with Sandboxed Environments 11. Use proftp with a MySQL Authentication Source 12. Prevent Stack-Smashing Attacks 13. Lock Down Your Kernel with grsecurity 14. Restrict Applications with grsecurity 15. Restrict System Calls with Systrace 16. Automated Systrace Policy Creation 17. Control Login Access with PAM 18. Restricted Shell Environments 19. Enforce User and Group Resource Limits 20. Automate System Updates Chapter 2. Windows Host Security 21. Check Servers for Applied Patches 22. Get a List of Open Files and Their Owning Processes 23. List Running Services and Open Ports 24. Enable Auditing 25. Secure Your Event Logs 26. Change Your Maximum Log File Sizes 27. Disable Default Shares 28. Encrypt Your Temp Folder 29. Clear the Paging File at Shutdown 30. Restrict Applications Available to Users Chapter 3. Network Security 31. Detect ARP Spoofing 32. Create a Static ARP Table 33. Firewall with Netfilter 34. Firewall with OpenBSD's PacketFilter 35. Create an Authenticated Gateway 36. Firewall with Windows 37. Keep Your Network Self-Contained 38. Test Your Firewall 39. MAC Filtering with Netfilter 40. Block OS Fingerprinting 41. Fool Remote Operating System Detection Software 42. Keep an Inventory of Your Network 43. Scan Your Network for Vulnerabilities 44. Keep Server Clocks Synchronized 45. Create Your Own Certificate Authority 46. Distribute Your CA to Clients 47. Encrypt IMAP and POP with SSL 48. Set Up TLS-Enabled SMTP 49. Detect Ethernet Sniffers Remotely 50. Install Apache with SSL and suEXEC 51. Secure BIND 52. Secure MySQL 53. Share Files Securely in Unix Chapter 4. Logging 54. Run a Central Syslog Server 55. Steer Syslog 56. Integrate Windows into Your Syslog Infrastructure 57. Automatically Summarize Your Logs 58. Monitor Your Logs Automatically 59. Aggregate Logs from Remote Sites 60. Log User Activity with Process Accounting Chapter 5. Monitoring and Trending 61. Monitor Availability 62. Graph Trends 63. Run ntop for Real-Time Network Stats 64. Audit Network Traffic 65. Collect Statistics with Firewall Rules 66. Sniff the Ether Remotely Chapter 6. Secure Tunnels 67. Set Up IPsec Under Linux 68. Set Up IPsec Under FreeBSD 69. Set Up IPsec in OpenBSD 70. PPTP Tunneling 71. Opportunistic Encryption with FreeS/WAN 72. Forward and Encrypt Traffic with SSH 73. Quick Logins with SSH Client Keys 74. Squid Proxy over SSH 75. Use SSH as a SOCKS Proxy 76. Encrypt and Tunnel Traffic with SSL 77. Tunnel Connections Inside HTTP 78. Tunnel with VTun and SSH 79. Automatic vtund.conf Generator 80. Create a Cross-Platform VPN


Best Sellers


Product Details
  • ISBN-13: 9780596006433
  • Publisher: O'Reilly Media
  • Publisher Imprint: O'Reilly Media
  • Height: 230 mm
  • Returnable: N
  • Weight: 434 gr
  • ISBN-10: 0596006438
  • Publisher Date: 01 Jun 2004
  • Binding: Paperback
  • Language: English
  • Spine Width: 19 mm
  • Width: 158 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Network Security Hacks
O'Reilly Media -
Network Security Hacks
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Network Security Hacks

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!