Computer Security for the Home and Small Office 146
Computer Security for the Home and Small Office | |
author | Thomas C. Greene |
pages | 405 |
publisher | Apress |
rating | 9 |
reviewer | Andrew Murphy |
ISBN | 1590593162 |
summary | No secrets means that open source software, when it survives, tends toward robustness -- so it can help even if you run a closed-source operating system. |
The book covers popular OSs replacements for Windows applications and utilities; it explains vulnerabilities; it offers practical setup information for both Windows and Linux to harden a system and make it extremely difficult to attack.
The Preface describes the book in general terms. The Introduction explains firewalls and their limitations, and explains how to install Mozilla to limit email and http exploits and spam.
Chapter One debunks the malicious-hacker mythology and shows that most so-called hackers are only script kiddies who are easily thwarted with commonsense tactics.
Chapter Two explains malware, spyware, bad system configurations, and the scores of other routes to system exploitation and privacy invasion that firewalls and antivirus software don't address. It includes a step-by-step guide to simplifying and hardening a system. Most importantly, it offers a useful guide to turning off unnecessary services and networking components for both Windows and Linux, and setting sensible user permissions, and is liberally illustrated with screen shots.
Chapter Three offers a good breakdown of social engineering and phishing scams, and how to defend against them.
Chapter Four is about using common tools, like Ethereal, Netstat, PGP, etc. It explains how to monitor an Internet connection to spot software secretly reaching out or phoning home to remote servers; how to monitor your system for signs of malicious processes; and how to use PGP and GnuPG to encrypt sensitive files and Internet correspondence. This is one of the best introductions to using encryption available anywhere.
Chapter Five explains how to eliminate all traces of Web activity from your computer and defeat forensic recovery of stored data; how to surf the Web anonymously using an encrypted connection and defeat remote monitoring; how to set up and use SSH (SecureShell) to conceal both your identity, and the data content of your Internet sessions from all third parties, including your ISP. The many hiding places of sensitive or incriminating data are revealed for both Windows and Linux users.
Chapter Six explains the advantages and disadvantages of migrating from Windows to Linux; why Linux is easier to configure for security, and why it's better suited to less technically-inclined users; how to judge whether Linux is right for you, and the issues you should consider before migrating. The author is clearly biased towards Linux, but he understands that most users will stick with Windows. Hence the emphasis on tools that run on Windows.
Chapter Seven is a catchall essay explaining security from an anecdotal point of view. There were places where it got a bit tedious, but the idea is to look at security as a process or a frame of mind, not a specific series of computer settings. The material in this section is informative in only a general sense. The real configuration information comes in chapters Two, Four, and Five.
There are several indexes with useful information on firewalls, ports, Trojan activity, sources of information, and more. Most of this information is conveniently located and linked at the author's website, BasicSec.org
Overall, the book is exceptionally well written for a tech manual. The author is a good writer and his prose flows nicely. The book is highly readable, and even witty in parts. I found myself laughing aloud on several occasions. The author has the art of The Register's irreverent presentation. I enjoyed reading it. But it is not perfect, so I give it a 9 out of 10.
My biggest criticism is that the book shifts back and forth from practice to theory and back again. It's good that readers learn the reasons for the (very sensible) procedures and settings listed; but I felt that the book was organized wrong. This is a minor issue, and the book remains exceptionally useful; but instead of interlacing the various parts, theory and practice might better have been separated in two distinct sections. It's difficult simply to flip to a section of this book and learn what needs to be done: there is a lot of theoretical talk between each practical item. It's very good talk, and very instructive talk, all right, but I would have preferred that it be located in a particular place. I would rather not have to read the entire book through in order to tweak my system for good security. Unfortunately, the author has structured the book so that a read-through is necessary.
Overall, this book will tell professionals what they need to do, and novices everything that professionals ought to know, but probably don't. It's in plain English, so no one should worry that they can't grasp it. You can make your computer, or your network, very hard to attack, whether you use Windows or Linux. This book will show you how in excellent detail. You've got to read the whole thing, unfortunately -- but it will work nicely for you, casual user and sysadmin alike.
You can purchase Computer Security for the Home and Small Office from bn.com. Slashdot welcomes readers' book reviews. To see your own review here, carefully read the book review guidelines, then visit the submission page.
Re:The problem with security books for the home us (Score:5, Informative)
Security = extra work, confusing settings, and ways to mess things up
Insecurity = identity theft, loss of property or information, and probably cancer
It sounds like a pretty easy choice to me.
Re:Is it ironic, hypocritical or neither? (Score:4, Informative)
And just in case you're wondering, the GNU also publishes the Free Documentation License [gnu.org].
Impressive link collection (Score:5, Informative)
Downloads
Linux Wipe Tools [slashdot.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.
No Messenger [slashdot.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger is absent, by an anonymous friend of The Register.
FileCheck MD5 [slashdot.org]: A free, simple, lightweight MD5 utility for Windows, courtesy of Brandon Staggs.
Errata [slashdot.org]: A text file containing my various blunders and ommissions in the book (right-click and "save as," or view as HTML [slashdot.org]). Last updated 6 June 2004.
Links to Other Goodies
Mozilla [mozilla.org]: A free, open source Web browser and e-mail client for Linux and Windows, feature rich and far more secure than Internet Explorer and Outlook Express. Recommended for novices.
Firefox [mozilla.org]: A free, open source, stand-alone Web browser for Linux and Windows. Very light and fast. Recommended for intermediate users.
Thunderbird [mozilla.org]: A free, open source e-mail and news client for Linux and Windows. Recommended for intermediate users.
GnuPG [gnupg.org]: Gnu Privacy Guard; a free, open source replacement for PGP, for Windows and Linux.
WinPT [sourceforge.net]: Windows Privacy Tools; a free, open source GUI frontend to GnuPG for Windows.
Anonymizer [anonymizer.com]: Various services for anonymous Web surfing, e-mail, chat, etc.
OpenSSH [openssh.org]: A free, open source SSH (Secure Shell) client and server for Windows and Linux.
PuTTY [greenend.org.uk]: A free, open source GUI frontend to OpenSSH for Windows.
Ethereal [ethereal.com]: A free, open source network traffic analyzer for Windows and Linux. Windows users will need to install WinPcap [polito.it] before installing Ethereal.
Ad-Aware [lavasoftusa.com]: A free, closed source adware/spyware scanner for Windows.
SpyBot Search & Destroy [safer-networking.org]: A free, closed source adware/spyware scanner for Windows.
Sam Spade [samspade.org]: CGI gateways to numerous online tools, such as whois, traceroute, etc.
SourceForge [sourceforge.net]: A vast repository of open-source software for Windows and Linux. The site can be overwhelming, but it has a search engine to help users locate packages.
GNU Project [gnu.org]: The home base of the open source movement. A repository of open source products, chiefly for UNIX-compatible systems.
Security Information
About Internet/Network Security [about.com]: An informative and useful site dealing with computer and Internet security, with reviews of security products and books, practical howtos and tips, and links to numerous tools and information resources, geared toward beginners and intermediate users.
SANS Institute [sans.org]: An educational and research organization with a vast archive of security research documents, news, and advisories, geared toward intermediate and advanced users.
CERT/CC [cert.org]: Computer Emergency Response Team Coordination Cente
Re:Average user?-Hidden security. (Score:4, Informative)
Only at the expense of security.
Unless you verify key fingerprints out of band you're getting very little protection. That's not transparent and I've never found an easy way to explain it.
Then there's backing up keyrings and choosing a meaningfully strong passphrase.
Macs left out. (sigh) (Score:4, Informative)
Dummies Guides already do all this, better too... (Score:3, Informative)
Well, that would be a first I suppose, him and Orlowski (sp?) are the two biggest problems the reg has IMHO.
For my money when there is already stuff like the Dummies Guide to Network Security (www.dummies.com) why bother?
For those that asked for online articles
http://www.dummies.com/WileyCDA/Dummies
http://www.dummies.c
http://www.dummies.c
etc etc
Re:Impressive link collection (Score:3, Informative)
Linux Wipe Tools [basicsec.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.
No Messenger [basicsec.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger is absent, by an anonymous friend of The Register.
FileCheck MD5 [basicsec.org]: A free, simple, lightweight MD5 utility for Windows, courtesy of Brandon Staggs.
Errata [basicsec.org]: A text file containing my various blunders and ommissions in the book (right-click and "save as," or view as HTML [basicsec.org]). Last updated 6 June 2004.
Joanh Hex