Testing Performance Home

Testing Performance Articles

Testing Performance Links

Testing Performance Books

Testing Performance Tools

Testing Performance Keywords

Testing Performance

Network Security Hacks

Contents Listing

Credits

Preface

Chapter 1. Unix Host Security
1. Secure Mount Points
2. Scan for SUID and SGID Programs
3. Scan For World- and Group-Writable Directories
4. Create Flexible Permissions Hierarchies with POSIX ACLs
5. Protect Your Logs from Tampering
6. Delegate Administrative Roles
7. Automate Cryptographic Signature Verification
8. Check for Listening Services
9. Prevent Services from Binding to an Interface
10. Restrict Services with Sandboxed Environments
11. Use proftp with a MySQL Authentication Source
12. Prevent Stack-Smashing Attacks
13. Lock Down Your Kernel with grsecurity
14. Restrict Applications with grsecurity
15. Restrict System Calls with Systrace
16. Automated Systrace Policy Creation
17. Control Login Access with PAM
18. Restricted Shell Environments
19. Enforce User and Group Resource Limits
20. Automate System Updates

Chapter 2. Windows Host Security
21. Check Servers for Applied Patches
22. Get a List of Open Files and Their Owning Processes
23. List Running Services and Open Ports
24. Enable Auditing
25. Secure Your Event Logs
26. Change Your Maximum Log File Sizes
27. Disable Default Shares
28. Encrypt Your Temp Folder
29. Clear the Paging File at Shutdown
30. Restrict Applications Available to Users

Chapter 3. Network Security
31. Detect ARP Spoofing
32. Create a Static ARP Table
33. Firewall with Netfilter
34. Firewall with OpenBSD's PacketFilter
35. Create an Authenticated Gateway
36. Firewall with Windows
37. Keep Your Network Self-Contained
38. Test Your Firewall
39. MAC Filtering with Netfilter
40. Block OS Fingerprinting
41. Fool Remote Operating System Detection Software
42. Keep an Inventory of Your Network
43. Scan Your Network for Vulnerabilities
44. Keep Server Clocks Synchronized
45. Create Your Own Certificate Authority
46. Distribute Your CA to Clients
47. Encrypt IMAP and POP with SSL
48. Set Up TLS-Enabled SMTP
49. Detect Ethernet Sniffers Remotely
50. Install Apache with SSL and suEXEC
51. Secure BIND
52. Secure MySQL
53. Share Files Securely in Unix

Chapter 4. Logging
54. Run a Central Syslog Server
55. Steer Syslog
56. Integrate Windows into Your Syslog Infrastructure
57. Automatically Summarize Your Logs
58. Monitor Your Logs Automatically
59. Aggregate Logs from Remote Sites
60. Log User Activity with Process Accounting

Chapter 5. Monitoring and Trending
61. Monitor Availability
62. Graph Trends
63. Run ntop for Real-Time Network Stats
64. Audit Network Traffic
65. Collect Statistics with Firewall Rules
66. Sniff the Ether Remotely

Chapter 6. Secure Tunnels
67. Set Up IPsec Under Linux
68. Set Up IPsec Under FreeBSD
69. Set Up IPsec in OpenBSD
70. PPTP Tunneling
71. Opportunistic Encryption with FreeS/WAN
72. Forward and Encrypt Traffic with SSH
73. Quick Logins with SSH Client Keys
74. Squid Proxy over SSH
75. Use SSH as a SOCKS Proxy
76. Encrypt and Tunnel Traffic with SSL
77. Tunnel Connections Inside HTTP
78. Tunnel with VTun and SSH
79. Automatic vtund.conf Generator
80. Create a Cross-Platform VPN
81. Tunnel PPP

Chapter 7. Network Intrusion Detection
82. Detect Intrusions with Snort
83. Keep Track of Alerts
84. Real-Time Monitoring
85. Manage a Sensor Network
86. Write Your Own Snort Rules
87. Prevent and Contain Intrusions with Snort_inline
88. Automated Dynamic Firewalling with SnortSam
89. Detect Anomalous Behavior
90. Automatically Update Snort's Rules
91. Create a Distributed Stealth Sensor Network
92. Use Snort in High-Performance Environments with Barnyard
93. Detect and Prevent Web Application Intrusions
94. Simulate a Network of Vulnerable Hosts
95. Record Honeypot Activity

Chapter 8. Recovery and Response
96. Image Mounted Filesystems
97. Verify File Integrity and Find Compromised Files
98. Find Compromised Packages with RPM
99. Scan for Root Kits
100. Find the Owner of a Network

Index

Google
Web www.performancetest.force9.co.uk

Contents
View a contents listing.

Short
Short Description.


Keyword Pages
administrator
cryptographic signature
firewall
host security
Linux
network security
networks
security
security tools
TCP-IP
UNIX
Windows

Keyword Bestsellers

UNIX

Windows

administrator

cryptographic signature

firewall

host security

Linux

network security

networks

security

security tools

TCP-IP

Testing Performance Bestsellers
The bestselling books on Amazon.

Articles

Load Testing

performance testing

Test Tools

Web Performance Tuning

Tool Mentor