Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Books Media Book Reviews

Computer Security for the Home and Small Office 146

Andrew Murphy writes " The Register's security guru Thomas Greene has written a book for the average computer user, though it contains a great deal of information that professionals need to know. It's insightful, instructive, and calls for open source software even on Windows for enhanced security. The single most interesting feature is the author's emphasis on open source software as a security feature per se. He rightly notes that there are no secrets in OSs, and teaches users to leverage this transparency regardless of their platform. As early as the introduction, Mozilla is urged as a secure replacement for IE and OE, and this came before the Scob outbreak." Read on for the rest of Murphy's review.
Computer Security for the Home and Small Office
author Thomas C. Greene
pages 405
publisher Apress
rating 9
reviewer Andrew Murphy
ISBN 1590593162
summary No secrets means that open source software, when it survives, tends toward robustness -- so it can help even if you run a closed-source operating system.

The book covers popular OSs replacements for Windows applications and utilities; it explains vulnerabilities; it offers practical setup information for both Windows and Linux to harden a system and make it extremely difficult to attack.

The Preface describes the book in general terms. The Introduction explains firewalls and their limitations, and explains how to install Mozilla to limit email and http exploits and spam.

Chapter One debunks the malicious-hacker mythology and shows that most so-called hackers are only script kiddies who are easily thwarted with commonsense tactics.

Chapter Two explains malware, spyware, bad system configurations, and the scores of other routes to system exploitation and privacy invasion that firewalls and antivirus software don't address. It includes a step-by-step guide to simplifying and hardening a system. Most importantly, it offers a useful guide to turning off unnecessary services and networking components for both Windows and Linux, and setting sensible user permissions, and is liberally illustrated with screen shots.

Chapter Three offers a good breakdown of social engineering and phishing scams, and how to defend against them.

Chapter Four is about using common tools, like Ethereal, Netstat, PGP, etc. It explains how to monitor an Internet connection to spot software secretly reaching out or phoning home to remote servers; how to monitor your system for signs of malicious processes; and how to use PGP and GnuPG to encrypt sensitive files and Internet correspondence. This is one of the best introductions to using encryption available anywhere.

Chapter Five explains how to eliminate all traces of Web activity from your computer and defeat forensic recovery of stored data; how to surf the Web anonymously using an encrypted connection and defeat remote monitoring; how to set up and use SSH (SecureShell) to conceal both your identity, and the data content of your Internet sessions from all third parties, including your ISP. The many hiding places of sensitive or incriminating data are revealed for both Windows and Linux users.

Chapter Six explains the advantages and disadvantages of migrating from Windows to Linux; why Linux is easier to configure for security, and why it's better suited to less technically-inclined users; how to judge whether Linux is right for you, and the issues you should consider before migrating. The author is clearly biased towards Linux, but he understands that most users will stick with Windows. Hence the emphasis on tools that run on Windows.

Chapter Seven is a catchall essay explaining security from an anecdotal point of view. There were places where it got a bit tedious, but the idea is to look at security as a process or a frame of mind, not a specific series of computer settings. The material in this section is informative in only a general sense. The real configuration information comes in chapters Two, Four, and Five.

There are several indexes with useful information on firewalls, ports, Trojan activity, sources of information, and more. Most of this information is conveniently located and linked at the author's website, BasicSec.org

Overall, the book is exceptionally well written for a tech manual. The author is a good writer and his prose flows nicely. The book is highly readable, and even witty in parts. I found myself laughing aloud on several occasions. The author has the art of The Register's irreverent presentation. I enjoyed reading it. But it is not perfect, so I give it a 9 out of 10.

My biggest criticism is that the book shifts back and forth from practice to theory and back again. It's good that readers learn the reasons for the (very sensible) procedures and settings listed; but I felt that the book was organized wrong. This is a minor issue, and the book remains exceptionally useful; but instead of interlacing the various parts, theory and practice might better have been separated in two distinct sections. It's difficult simply to flip to a section of this book and learn what needs to be done: there is a lot of theoretical talk between each practical item. It's very good talk, and very instructive talk, all right, but I would have preferred that it be located in a particular place. I would rather not have to read the entire book through in order to tweak my system for good security. Unfortunately, the author has structured the book so that a read-through is necessary.

Overall, this book will tell professionals what they need to do, and novices everything that professionals ought to know, but probably don't. It's in plain English, so no one should worry that they can't grasp it. You can make your computer, or your network, very hard to attack, whether you use Windows or Linux. This book will show you how in excellent detail. You've got to read the whole thing, unfortunately -- but it will work nicely for you, casual user and sysadmin alike.


You can purchase Computer Security for the Home and Small Office from bn.com. Slashdot welcomes readers' book reviews. To see your own review here, carefully read the book review guidelines, then visit the submission page.

This discussion has been archived. No new comments can be posted.

Computer Security for the Home and Small Office

Comments Filter:
  • by lukewarmfusion ( 726141 ) on Wednesday August 11, 2004 @02:38PM (#9941735) Homepage Journal
    The parent post is actually insightful (as well as funny). So many of us have tried to tell our parents, friends, relatives - even complete strangers - about the importance of security. But they still download Kazaa (not lite), they still choose a password named after their dog, and they still open every damn attachment they get.

    Security = extra work, confusing settings, and ways to mess things up
    Insecurity = identity theft, loss of property or information, and probably cancer

    It sounds like a pretty easy choice to me.
  • by TheSpoom ( 715771 ) * <slashdot@@@uberm00...net> on Wednesday August 11, 2004 @02:44PM (#9941786) Homepage Journal
    That's the classic "free as in beer vs. free as in freedom" argument, and has been argued on Slashdot too many times to count. Just take a look at the GNU philosophy [gnu.org] section for the answer to your question.

    And just in case you're wondering, the GNU also publishes the Free Documentation License [gnu.org].
  • by Anonymous Coward on Wednesday August 11, 2004 @02:45PM (#9941798)
    Just in case his site gets /.'ed, here is his impressive list of links. - Jonah Hex in non-karma whore mode.
    Downloads
    Linux Wipe Tools [slashdot.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.

    No Messenger [slashdot.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger is absent, by an anonymous friend of The Register.

    FileCheck MD5 [slashdot.org]: A free, simple, lightweight MD5 utility for Windows, courtesy of Brandon Staggs.

    Errata [slashdot.org]: A text file containing my various blunders and ommissions in the book (right-click and "save as," or view as HTML [slashdot.org]). Last updated 6 June 2004.

    Links to Other Goodies
    Mozilla [mozilla.org]: A free, open source Web browser and e-mail client for Linux and Windows, feature rich and far more secure than Internet Explorer and Outlook Express. Recommended for novices.

    Firefox [mozilla.org]: A free, open source, stand-alone Web browser for Linux and Windows. Very light and fast. Recommended for intermediate users.

    Thunderbird [mozilla.org]: A free, open source e-mail and news client for Linux and Windows. Recommended for intermediate users.

    GnuPG [gnupg.org]: Gnu Privacy Guard; a free, open source replacement for PGP, for Windows and Linux.

    WinPT [sourceforge.net]: Windows Privacy Tools; a free, open source GUI frontend to GnuPG for Windows.

    Anonymizer [anonymizer.com]: Various services for anonymous Web surfing, e-mail, chat, etc.

    OpenSSH [openssh.org]: A free, open source SSH (Secure Shell) client and server for Windows and Linux.

    PuTTY [greenend.org.uk]: A free, open source GUI frontend to OpenSSH for Windows.

    Ethereal [ethereal.com]: A free, open source network traffic analyzer for Windows and Linux. Windows users will need to install WinPcap [polito.it] before installing Ethereal.

    Ad-Aware [lavasoftusa.com]: A free, closed source adware/spyware scanner for Windows.

    SpyBot Search & Destroy [safer-networking.org]: A free, closed source adware/spyware scanner for Windows.

    Sam Spade [samspade.org]: CGI gateways to numerous online tools, such as whois, traceroute, etc.

    SourceForge [sourceforge.net]: A vast repository of open-source software for Windows and Linux. The site can be overwhelming, but it has a search engine to help users locate packages.

    GNU Project [gnu.org]: The home base of the open source movement. A repository of open source products, chiefly for UNIX-compatible systems.

    Security Information
    About Internet/Network Security [about.com]: An informative and useful site dealing with computer and Internet security, with reviews of security products and books, practical howtos and tips, and links to numerous tools and information resources, geared toward beginners and intermediate users.

    SANS Institute [sans.org]: An educational and research organization with a vast archive of security research documents, news, and advisories, geared toward intermediate and advanced users.

    CERT/CC [cert.org]: Computer Emergency Response Team Coordination Cente
  • by Beryllium Sphere(tm) ( 193358 ) on Wednesday August 11, 2004 @03:03PM (#9941972) Journal
    >PGP can be made a transparent part of the process of using your computer.

    Only at the expense of security.

    Unless you verify key fingerprints out of band you're getting very little protection. That's not transparent and I've never found an easy way to explain it.

    Then there's backing up keyrings and choosing a meaningfully strong passphrase.
  • by tb3 ( 313150 ) on Wednesday August 11, 2004 @03:11PM (#9942027) Homepage
    It's a pity he covers Windows and Linux but completely ignores Macs. (I checked his website; I'm sure). There must be the same number of home/office users of Macs as Linux, probably more. Although the Mac is secure against spyware, malware and viruses at present, it would be useful to inform people about security considerations for the Mac, how the built-in firewall works, and so forth.
  • by GuyFawkes ( 729054 ) on Wednesday August 11, 2004 @03:19PM (#9942088) Homepage Journal
    Tom Greene writing something insightful and instructive?

    Well, that would be a first I suppose, him and Orlowski (sp?) are the two biggest problems the reg has IMHO.

    For my money when there is already stuff like the Dummies Guide to Network Security (www.dummies.com) why bother?

    For those that asked for online articles
    http://www.dummies.com/WileyCDA/DummiesA rticle/id- 1983,subcat-NETWORKING.html
    http://www.dummies.co m/WileyCDA/DummiesArticle/id- 1808,subcat-NETWORKING.html
    http://www.dummies.co m/WileyCDA/DummiesArticle/id- 1518,subcat-NETWORKING.html

    etc etc
  • by Jonah Hex ( 651948 ) <hexdotms&gmail,com> on Wednesday August 11, 2004 @03:50PM (#9942345) Homepage Journal
    first 4 links are 404
    Yea, sorry about that, they link directly to the files on his site and thus he didn't have a "complete" link to them including the server info. Here's "fixed" links:

    Linux Wipe Tools [basicsec.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.

    No Messenger [basicsec.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger is absent, by an anonymous friend of The Register.

    FileCheck MD5 [basicsec.org]: A free, simple, lightweight MD5 utility for Windows, courtesy of Brandon Staggs.

    Errata [basicsec.org]: A text file containing my various blunders and ommissions in the book (right-click and "save as," or view as HTML [basicsec.org]). Last updated 6 June 2004.

    Joanh Hex

"Life begins when you can spend your spare time programming instead of watching television." -- Cal Keegan

Working...