Flylib.com
Maximum Mac OS X Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158
Authors:
John Ray
,
William C. Ray
BUY ON AMAZON
COVER
TOC
Copyright
About the Authors
Contributing Author
Acknowledgments
We Want to Hear from You
Reader Services
Introduction
Part I: Mac OS X Security Basics: Learning to Think Secure
Chapter 1. An Introduction to Mac OS X Security
What Is Security?
Traditional Mac OS Versus Mac OS X
Understanding the Threat
Summary
Chapter 2. Thinking Secure: Security Philosophy and Physical Concerns
Physical System Vulnerabilities
Server Location and Physical Access
Server and Facility Location
Physical Access to the Facility
Computer Use Policies
Physical Security Devices
Network Considerations
Summary
Chapter 3. People Problems: Users, Intruders, and the World Around Them
Your Users: People with Whom You Share Your Computer
The Bad Guys: People Who Would Do Your System Harm
Everybody Else
Summary
Part II: Vulnerabilities and Exposures: How Things Don t Work, and Why
Chapter 4. Theft and Destruction of Property: Data Attacks
Keeping Data Secret: Cryptography, Codes, and Ciphers
Data-Divulging Applications
Steganography and Steganalysis: Hiding Data in Plain Sight, and How to Find and Eliminate It
Summary
Chapter 5. Picking Locks: Password Attacks
Typical Password Mechanisms
Testing Password Security
Improving Password Security, and Alternatives to the Standard Password Mechanisms in Mac OS X
Summary
Chapter 6. Evil Automatons: Malware, Trojans, Viruses, and Worms
Defining Software Behavioral Space
Malware
Malware Threats
Solving the Problem
Summary
Chapter 7. Eavesdropping and Snooping for Information: Sniffers and Scanners
Eavesdropping and Information Gathering
Monitoring Traffic with tcpdump
Sniffing Around with Ettercap
Network Surveys with NMAP
Other Information-Gathering Tools
Ethics of Information Gathering
Additional Resources
Summary
Chapter 8. Impersonation and Infiltration: Spoofing
Spoofing Attacks
Spoofing Defenses
Summary
Chapter 9. Everything Else
DoS
Buffer Overflows
Session Hijacking
Everything Else
Additional Resources
Summary
Part III: Specific Mac OS X Resources and How to Secure Them: Security Tips, Tricks, and Recipes
Chapter 10. User, Environment, and Application Security
Adding a New User
Using the NetInfo Database to Customize a User
Sane User Account Management
Skeleton User Accounts
Command-Line Administration Tools
Restricting User Capabilities
Summary
Chapter 11. Introduction to Mac OS X Network Services
What Is a Network Service?
Network Service Vulnerabilities
Controlling Mac OS X Network Service Processes
Protecting inetd with TCP Wrappers
Increasing Security with xinetd
Summary
Chapter 12. FTP Security
FTP Vulnerabilities
Activating the FTP Server
Configuring the Default lukemftpd FTP Server
Setting Up Anonymous FTP
Replacing the Mac OS X FTP Server
Alternatives to FTP
Summary
Chapter 13. Mail Server Security
Basic Vulnerabilities
Sendmail
Activating Sendmail on Mac OS X
Protecting Sendmail
Updating Your Sendmail Installation
Postfix as an Alternative
Installing Postfix
Protecting Postfix
Delivering MailUW IMAP
Summary
Chapter 14. Remote Access: Secure Shell, VNC, Timbuktu, Apple Remote Desktop
What Is SSH?
SSH Vulnerabilities
Vulnerabilities in telnet and rlogin
Activating SSH
Advanced SSH Features
GUI Access Methods
Summary
Chapter 15. Web Server Security
Introducing Apache
SSL-Protected Apache
Additional Resources
Summary
Chapter 16. File Sharing Security
Apple Filing Protocol
WebDAV
Sharing Files with Samba
Common Unix Printing System
Other Resources
Summary
Part IV: Prevention, Detection, and Reaction to Attacks: Health Care and Checkups for Your Machine
Chapter 17. Blocking Network Access: Firewalls
Firewalling
Built-In GUI Mac OS X Firewall Tools
Built-In Command-Line Mac OS X Firewall Tools
Firewall Hardware
Firewall Resources
Summary
Chapter 18. Alarm Systems: Intrusion Detection
What Is Intrusion Detection?
Psionic PortSentry
Snort
IDS Resources
Summary
Chapter 19. Logs and User Activity Accounting
The Role of Logs
User Logins and Accounting
Automated Log Monitoring: LogSentry
Common System Log Changes
Summary
Chapter 20. Disaster Planning and Recovery
What Is Disaster Recovery and Why Do You Need It?
Creating a Disaster Recovery Plan
Mac OS X Backup Software
Synchronizing Files: rsync
Summary
Part V: Appendixes
Appendix A. Glossary
Appendix B. Security Resources
Appendix C. Secure Web Development
Web Development Risks
Protecting Your Web Applications
Adding and Using suEXEC
Testing for Known CGI Vulnerabilities: Whisker
Additional Resources
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158
Authors:
John Ray
,
William C. Ray
BUY ON AMAZON
MySQL Stored Procedure Programming
Using Non-SELECT SQL in Stored Programs
Other Functions
Conclusion
Trigger Overhead
Calling Stored Programs from Application Code
Lotus Notes and Domino 6 Development (2nd Edition)
Using Templates to Replicate Design Changes
Creating Shared Actions
Working with the Page Properties Box
Automating Your Application with Agents
Using Other Java IDEs
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Jump Start with SWT/JFace
Layouts
Scales, Sliders, and Progress Bars
Drag and Drop and the Clipboard
Printing
Documenting Software Architectures: Views and Beyond
Generalization Style
For Further Reading
The Pipe-and-Filter Style
Peer-to-Peer Style
For Further Reading
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Professional Responsibility
Exam Prep Questions
Appendix A. CD Contents and Installation Instructions
Sap Bw: a Step By Step Guide for Bw 2.0
Creating InfoObject Catalogs
InfoCube Design
Summary
Replicating R/3 DataSources
Section B.2. Dispatcher, Work Processes, and Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies