Flylib.com
Maximum Mac OS X Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158
Authors:
John Ray
,
William C. Ray
BUY ON AMAZON
COVER
TOC
Copyright
About the Authors
Contributing Author
Acknowledgments
We Want to Hear from You
Reader Services
Introduction
Part I: Mac OS X Security Basics: Learning to Think Secure
Chapter 1. An Introduction to Mac OS X Security
What Is Security?
Traditional Mac OS Versus Mac OS X
Understanding the Threat
Summary
Chapter 2. Thinking Secure: Security Philosophy and Physical Concerns
Physical System Vulnerabilities
Server Location and Physical Access
Server and Facility Location
Physical Access to the Facility
Computer Use Policies
Physical Security Devices
Network Considerations
Summary
Chapter 3. People Problems: Users, Intruders, and the World Around Them
Your Users: People with Whom You Share Your Computer
The Bad Guys: People Who Would Do Your System Harm
Everybody Else
Summary
Part II: Vulnerabilities and Exposures: How Things Don t Work, and Why
Chapter 4. Theft and Destruction of Property: Data Attacks
Keeping Data Secret: Cryptography, Codes, and Ciphers
Data-Divulging Applications
Steganography and Steganalysis: Hiding Data in Plain Sight, and How to Find and Eliminate It
Summary
Chapter 5. Picking Locks: Password Attacks
Typical Password Mechanisms
Testing Password Security
Improving Password Security, and Alternatives to the Standard Password Mechanisms in Mac OS X
Summary
Chapter 6. Evil Automatons: Malware, Trojans, Viruses, and Worms
Defining Software Behavioral Space
Malware
Malware Threats
Solving the Problem
Summary
Chapter 7. Eavesdropping and Snooping for Information: Sniffers and Scanners
Eavesdropping and Information Gathering
Monitoring Traffic with tcpdump
Sniffing Around with Ettercap
Network Surveys with NMAP
Other Information-Gathering Tools
Ethics of Information Gathering
Additional Resources
Summary
Chapter 8. Impersonation and Infiltration: Spoofing
Spoofing Attacks
Spoofing Defenses
Summary
Chapter 9. Everything Else
DoS
Buffer Overflows
Session Hijacking
Everything Else
Additional Resources
Summary
Part III: Specific Mac OS X Resources and How to Secure Them: Security Tips, Tricks, and Recipes
Chapter 10. User, Environment, and Application Security
Adding a New User
Using the NetInfo Database to Customize a User
Sane User Account Management
Skeleton User Accounts
Command-Line Administration Tools
Restricting User Capabilities
Summary
Chapter 11. Introduction to Mac OS X Network Services
What Is a Network Service?
Network Service Vulnerabilities
Controlling Mac OS X Network Service Processes
Protecting inetd with TCP Wrappers
Increasing Security with xinetd
Summary
Chapter 12. FTP Security
FTP Vulnerabilities
Activating the FTP Server
Configuring the Default lukemftpd FTP Server
Setting Up Anonymous FTP
Replacing the Mac OS X FTP Server
Alternatives to FTP
Summary
Chapter 13. Mail Server Security
Basic Vulnerabilities
Sendmail
Activating Sendmail on Mac OS X
Protecting Sendmail
Updating Your Sendmail Installation
Postfix as an Alternative
Installing Postfix
Protecting Postfix
Delivering MailUW IMAP
Summary
Chapter 14. Remote Access: Secure Shell, VNC, Timbuktu, Apple Remote Desktop
What Is SSH?
SSH Vulnerabilities
Vulnerabilities in telnet and rlogin
Activating SSH
Advanced SSH Features
GUI Access Methods
Summary
Chapter 15. Web Server Security
Introducing Apache
SSL-Protected Apache
Additional Resources
Summary
Chapter 16. File Sharing Security
Apple Filing Protocol
WebDAV
Sharing Files with Samba
Common Unix Printing System
Other Resources
Summary
Part IV: Prevention, Detection, and Reaction to Attacks: Health Care and Checkups for Your Machine
Chapter 17. Blocking Network Access: Firewalls
Firewalling
Built-In GUI Mac OS X Firewall Tools
Built-In Command-Line Mac OS X Firewall Tools
Firewall Hardware
Firewall Resources
Summary
Chapter 18. Alarm Systems: Intrusion Detection
What Is Intrusion Detection?
Psionic PortSentry
Snort
IDS Resources
Summary
Chapter 19. Logs and User Activity Accounting
The Role of Logs
User Logins and Accounting
Automated Log Monitoring: LogSentry
Common System Log Changes
Summary
Chapter 20. Disaster Planning and Recovery
What Is Disaster Recovery and Why Do You Need It?
Creating a Disaster Recovery Plan
Mac OS X Backup Software
Synchronizing Files: rsync
Summary
Part V: Appendixes
Appendix A. Glossary
Appendix B. Security Resources
Appendix C. Secure Web Development
Web Development Risks
Protecting Your Web Applications
Adding and Using suEXEC
Testing for Known CGI Vulnerabilities: Whisker
Additional Resources
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158
Authors:
John Ray
,
William C. Ray
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Why Are Projects Challenging?
15 Common Mistakes of Project Managers
Lessons from Project Recoveries
"Managing Project Deliverables" Means What Exactly?
Options for Issue Log
Systematic Software Testing (Artech House Computer Library)
Detailed Test Planning
The Software Tester
The Test Manager
Some Final Thoughts…
Appendix C IEEE Templates
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Null Interface
Interior Routing Protocols
A Simple BGP Configuration
Encrypted Tunnels
A.1. IPv4 Subnetting
Sap Bw: a Step By Step Guide for Bw 2.0
Using the Persistent Staging Area (PSA)
Loading Data into the ODS Object
Tuning Query Performance
Tuning Load Performance
Section B.1. SAP Basis 3-Tier Architecture
DNS & BIND Cookbook
Registering a Reverse-Mapping Domain
Mapping Any Domain Name in a Zone to a Single IP Address
Determining the Order in Which a Name Server Returns Answers
Introduction
Running the Name Server as a User Other than Root
Digital Character Animation 3 (No. 3)
Surface Types
Chapter Three. Rigging Characters
Mesh Deformation
Beyond Walking
Acting Vs. Animating
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies