| 
 Testing Performance Home 
 Testing Performance Articles 
 Testing Performance Links 
Testing Performance Books 
Testing Performance Tools 
Testing Performance Keywords 
 | 
Testing Performance
Network Security Hacks
| 
 | 
 |  
| 
	
 | 
	
 | 	
 
| 
 Contents Listing
  Credits   
 
 Preface   
 
 Chapter 1. Unix Host Security  
        1. Secure Mount Points   
        2. Scan for SUID and SGID Programs   
        3. Scan For World- and Group-Writable Directories   
        4. Create Flexible Permissions Hierarchies with POSIX ACLs   
        5. Protect Your Logs from Tampering   
        6. Delegate Administrative Roles   
        7. Automate Cryptographic Signature Verification   
        8. Check for Listening Services   
        9. Prevent Services from Binding to an Interface   
        10. Restrict Services with Sandboxed Environments   
        11. Use proftp with a MySQL Authentication Source   
        12. Prevent Stack-Smashing Attacks   
        13. Lock Down Your Kernel with grsecurity   
        14. Restrict Applications with grsecurity   
        15. Restrict System Calls with Systrace   
        16. Automated Systrace Policy Creation   
        17. Control Login Access with PAM   
        18. Restricted Shell Environments   
        19. Enforce User and Group Resource Limits   
        20. Automate System Updates   
 
 Chapter 2. Windows Host Security  
        21. Check Servers for Applied Patches   
        22. Get a List of Open Files and Their Owning Processes   
        23. List Running Services and Open Ports   
        24. Enable Auditing   
        25. Secure Your Event Logs   
        26. Change Your Maximum Log File Sizes   
        27. Disable Default Shares   
        28. Encrypt Your Temp Folder   
        29. Clear the Paging File at Shutdown   
        30. Restrict Applications Available to Users   
 
 Chapter 3. Network Security  
        31. Detect ARP Spoofing   
        32. Create a Static ARP Table   
        33. Firewall with Netfilter   
        34. Firewall with OpenBSD's PacketFilter   
        35. Create an Authenticated Gateway   
        36. Firewall with Windows   
        37. Keep Your Network Self-Contained   
        38. Test Your Firewall   
        39. MAC Filtering with Netfilter   
        40. Block OS Fingerprinting   
        41. Fool Remote Operating System Detection Software  
        42. Keep an Inventory of Your Network   
        43. Scan Your Network for Vulnerabilities   
        44. Keep Server Clocks Synchronized   
        45. Create Your Own Certificate Authority   
        46. Distribute Your CA to Clients   
        47. Encrypt IMAP and POP with SSL   
        48. Set Up TLS-Enabled SMTP   
        49. Detect Ethernet Sniffers Remotely   
        50. Install Apache with SSL and suEXEC   
        51. Secure BIND   
        52. Secure MySQL   
        53. Share Files Securely in Unix   
 
 Chapter 4. Logging  
        54. Run a Central Syslog Server   
        55. Steer Syslog   
        56. Integrate Windows into Your Syslog Infrastructure
        57. Automatically Summarize Your Logs   
        58. Monitor Your Logs Automatically   
        59. Aggregate Logs from Remote Sites   
        60. Log User Activity with Process Accounting   
 
 Chapter 5. Monitoring and Trending  
        61. Monitor Availability   
        62. Graph Trends   
        63. Run ntop for Real-Time Network Stats   
        64. Audit Network Traffic   
        65. Collect Statistics with Firewall Rules   
        66. Sniff the Ether Remotely   
 
 Chapter 6. Secure Tunnels  
        67. Set Up IPsec Under Linux   
        68. Set Up IPsec Under FreeBSD   
        69. Set Up IPsec in OpenBSD   
        70. PPTP Tunneling   
        71. Opportunistic Encryption with FreeS/WAN   
        72. Forward and Encrypt Traffic with SSH   
        73. Quick Logins with SSH Client Keys   
        74. Squid Proxy over SSH   
        75. Use SSH as a SOCKS Proxy   
        76. Encrypt and Tunnel Traffic with SSL   
        77. Tunnel Connections Inside HTTP   
        78. Tunnel with VTun and SSH   
        79. Automatic vtund.conf Generator   
        80. Create a Cross-Platform VPN   
        81. Tunnel PPP   
 
 Chapter 7. Network Intrusion Detection  
        82. Detect Intrusions with Snort   
        83. Keep Track of Alerts   
        84. Real-Time Monitoring   
        85. Manage a Sensor Network   
        86. Write Your Own Snort Rules   
        87. Prevent and Contain Intrusions with Snort_inline 
        88. Automated Dynamic Firewalling with SnortSam   
        89. Detect Anomalous Behavior   
        90. Automatically Update Snort's Rules   
        91. Create a Distributed Stealth Sensor Network   
        92. Use Snort in High-Performance Environments with Barnyard   
        93. Detect and Prevent Web Application Intrusions   
        94. Simulate a Network of Vulnerable Hosts   
        95. Record Honeypot Activity   
 
 Chapter 8. Recovery and Response  
        96. Image Mounted Filesystems   
        97. Verify File Integrity and Find Compromised Files 
        98. Find Compromised Packages with RPM   
        99. Scan for Root Kits   
        100. Find the Owner of a Network   
 
 Index 
 | 
 
 
 | 
 Contents
 View a contents listing.
 
 Short
 Short Description.
 	
 
 Keyword Pages
 administrator
 cryptographic signature
 firewall
 host security
 Linux
 network security
 networks
 security
 security tools
 TCP-IP
 UNIX
 Windows
 	
Keyword Bestsellers
  UNIX
  
 Windows
  
administrator
  
cryptographic signature
  
firewall
  
host security
  
Linux
  
network security
  
networks
  
security
  
security tools
  
TCP-IP
  
Testing Performance Bestsellers The bestselling books on Amazon. 
Articles 	
 Load Testing 
 performance testing 
 Test Tools 
 Web Performance Tuning 
 Tool Mentor 
 |