Advertisement 468 x 60 Here...
www.komud.com

Sunday, February 12, 2012

The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks


Download
  • Publisher:   AUERBACH
  • Number Of Pages:   896
  • Publication Date:   2003-11-24
  • Sales Rank:   469262
  • ISBN / ASIN:   0849308887
  • EAN:   9780849308888
  • Binding:   Hardcover
  • Manufacturer:   AUERBACH
  • Studio:   AUERBACH
  • Average Rating:   4
  • Total Reviews:   5


Description:
This guide reveals the technical aspects of hacking that are least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Date: 2005-07-19 Rating: 2
Review:
It wasn't what I expected.

I found they print of the book isn't practical, pages too closed to each other. It speaks about Windows2000 exploits and tools used to hack into it, while Windows2003 is out from a while; but no one can deny the book had usefull things in it.

Date: 2004-09-03 Rating: 5
Review:
The Definitive Guide to Computer Security

Susan has presented a thorough guide to computer security and how to guard against internal and external vulnerabilities. She allows the reader to get inside the mind of both the nefarious hacker and the seasoned defender.

Recommended for the beginner through the advanced security consultant.....

Date: 2004-04-15 Rating: 5
Review:
Make sure you have a copy of this handbook close at hand!

...This book covers a wide array of topics, focusing on three aspects of each topic: technical background, hacking, and security. The coverage is both comprehensive and practical. The book explains the technical and conceptual foundations of computer security. Its information is organized in a way that makes it easy to find material relevant to any questions you may have regarding hacking and security. And every chapter points to additional materials if you want to investigate further.

You'll learn all about the anatomy of various types of attacks, including the five elements of attack strategy: reconnaissance, mapping targets, system or network penetration, denial-of-service, and consolidation. You'll also learn about the tools you'll need to defend your network, how they all work within a security framework, and the strengths and weaknesses of each. Included are tools for the purposes of access control, authentication, auditing, privacy, intrusion detection, data integrity, and more.

If you are a network or security administrator, protecting your network's integrity is one of your most important tasks. Before you begin your chess match with the world's hackers, make sure you know the rules, the tools, and the possibilities of the game. Make sure you understand the strategies that will be used against you and that you can use against your opponents. Make sure you have a copy of The Hacker's Handbook close at hand. Hey, I do! - Raffiudeen Illahideen, IL, USA

Date: 2004-02-26 Rating: 4
Review:
Good solid work

"The Hacker's Handbook" is a comprehensive and entertaining volume on security. It has most of the defining traits of a great book, such as clearly stated goal (authors realize that lots of security books are out there and one needs to differentiate) as well as some unique content on application attacks.

The book is a technically sound volume, I found very few factual mistakes. I found some interesting content on central auth servers such as radius, which I haven't seen described well elsewhere. Defensive tool info is a bit jumbled and not new. For example, IDS coverage is too non-specific to be useful. I also found a couple of other chapters a bit weak on interesting content.

The book covers the security field on many levels - from concepts to scripts - and can be successfully used by entry-level people as well as experts. The book is better suited for technologists rather than managers. Security analysts/admins, hands-on security managers, security savvy system and network admins, students of computer security can benefuit from a book.

Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major security information management company. He is the author of the book "Security Warrior" (O'Reilly, 2004). His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org

Date: 2003-12-24 Rating: 5
Review:
Great Book

I am a computer security consultant and I think this book is great. I found it complete and through. I would highly recommend it. It is like 800 plus pages. I wonder how many keyboards got worn out authoring this outstanding work.
Read more»

Saturday, February 11, 2012

PC Magazine Fighting Spyware, Viruses, and Malware

Download
  • Publisher:   Wiley
  • Number Of Pages:   382
  • Publication Date:   2004-12-31
  • ISBN-10 / ASIN:   0764577697
  • ISBN-13 / EAN:   9780764577697






Description:
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer--like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC--along with your wallet.

Here's how you can
* Learn to recognize when a Trojan horse, a virus, adware, or spyware has invaded your PC
* Get the tools that can cure an infection
* Dig into the Windows Registry to remove the nastiest of bugs
* Prevent a recurrence with personal firewalls and protective software
* Deal with the onslaught of spam
* Keep your defenses up-to-date

Give it the boot
If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted--that is, before you got infected.
-- From Chapter 4

Summary: Simply the Best
Rating: 5
I normally like to write some detailed reviews but not on this book.

If you really want a fast read broken down into areas that let you know how the bad guys are screwing with your computer AND you buy this book.

You will learn what spyware, malware, viruses and trojans are and the best ways-products to use. No second guessing and in fact this book should be required reading for all American students.

On average I find about 35 instances of pests per PC I work on so do yourself a favor. If you want to learn more in detail, get this book.

And don't forget as Red Green says, "if the women don't find you handsome they should at least find you handy".
Mike


Summary: Wordy but helpful
Rating: 5
This book gives alot of information, probably more than most will want to read. But if you can wade through all of it you will find some very useful information. It is very techinical information. It does however provide an indepth explanation of how viruses, hijackers, etc work and what you can do to protect yourself. Overall it is a great buy with very much useful info.

Summary: fighting malware
Rating: 5
Tittel can certainly unsettle the reader! He warns of the increasing encroachments against your computer. The biggest single danger is that this might be your home computer. Not a computer at your workplace, for which you might be able to ask a sysadmin for help.

So it's you and Tittel against the 3 menaces. Be aware that the terminology in the text and title may vary from what others use. Often, malware is taken to include viruses. I think he chose to break viruses out separately from malware so that the title would outreach to more people. Malware is still somewhat of a techie term, while spyware and viruses have broader recognition.

Naturally, since we're discussing personal computers, the text tends to focus on those running a Microsoft operating system. But in fact, much of his advice applies to Macs and linux/unix machines. Though users of the former 2 types might take heart in knowing that most viruses or worms won't go after their machines.

Tittel explains that increasingly, it's harder to draw clear lines between malware, spyware and adware. But he shows how to use existing anti-malware products that can scan for these and remove them. These products use combinations of signatures of known malware, and also search for "strange" activity that is typical of malware. However, since new variants of malware are continually being developed and found, you should always download the latest sets of signatures from your vendor, before running the tests.

Tittel also gives a succinct description of phishing. A particularly virulent type of malware that has increased enormously in the last 2 years. He suggests that you scrutinise the links and be very wary of any message that asks for personal information; either in a reply, or in a web page pointed to from that message. Unfortunately, the phishers continue to refine their tactics and many users simply aren't savvy enough to follow Tittel's suggestions. These users may be a minority, but there are enough of them to make this worthwhile for the phishers.

Summary: Good Overall Viewpoint
Rating: 5
Any of us connected on-line for even a few minutes has probably been the recipient of at least one virus attack.

Not only viruses, but many other kinds of intrusive software would like to come into your machine for its own purpose. This book talks about the major kinds of invasions you might expect and how to prevent them from entering your machine.

Most of us have learned about viruses the hard way, we cought them and then had to learn how to clean the system. Here in one book is a complete introduction to the problem. It covers all the common types of problems a PC is likely to encounter in one place.
Read more»