Network Security Hacks: Tips & Tools for Protecting Your Privacy

Front Cover
"O'Reilly Media, Inc.", Oct 30, 2006 - Computers - 480 pages

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

In fact, this "roll up your sleeves and get busy" security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective.

 

Contents

Unix Host Security
1
Windows Host Security
58
Privacy and Anonymity
91
Firewalling
117
Encrypting and Securing Services
158
Network Security
183
Wireless Security
236
Logging
250
Monitoring and Trending
282
Secure Tunnels
301
Network Intrusion Detection
348
Recovery and Response
413
Index
429
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 48 - Only use this method from the console; NEVER from remote. If you are using telnet, xterm, or a dial-in, type AC now or exit with no password. Then run opiepasswd without the -c parameter. Using MD5 to compute responses. Enter new secret pass phrase: Again new secret pass phrase: ID...

Bibliographic information