Computer Security for the Home and Small Office 146
Computer Security for the Home and Small Office | |
author | Thomas C. Greene |
pages | 405 |
publisher | Apress |
rating | 9 |
reviewer | Andrew Murphy |
ISBN | 1590593162 |
summary | No secrets means that open source software, when it survives, tends toward robustness -- so it can help even if you run a closed-source operating system. |
The book covers popular OSs replacements for Windows applications and utilities; it explains vulnerabilities; it offers practical setup information for both Windows and Linux to harden a system and make it extremely difficult to attack.
The Preface describes the book in general terms. The Introduction explains firewalls and their limitations, and explains how to install Mozilla to limit email and http exploits and spam.
Chapter One debunks the malicious-hacker mythology and shows that most so-called hackers are only script kiddies who are easily thwarted with commonsense tactics.
Chapter Two explains malware, spyware, bad system configurations, and the scores of other routes to system exploitation and privacy invasion that firewalls and antivirus software don't address. It includes a step-by-step guide to simplifying and hardening a system. Most importantly, it offers a useful guide to turning off unnecessary services and networking components for both Windows and Linux, and setting sensible user permissions, and is liberally illustrated with screen shots.
Chapter Three offers a good breakdown of social engineering and phishing scams, and how to defend against them.
Chapter Four is about using common tools, like Ethereal, Netstat, PGP, etc. It explains how to monitor an Internet connection to spot software secretly reaching out or phoning home to remote servers; how to monitor your system for signs of malicious processes; and how to use PGP and GnuPG to encrypt sensitive files and Internet correspondence. This is one of the best introductions to using encryption available anywhere.
Chapter Five explains how to eliminate all traces of Web activity from your computer and defeat forensic recovery of stored data; how to surf the Web anonymously using an encrypted connection and defeat remote monitoring; how to set up and use SSH (SecureShell) to conceal both your identity, and the data content of your Internet sessions from all third parties, including your ISP. The many hiding places of sensitive or incriminating data are revealed for both Windows and Linux users.
Chapter Six explains the advantages and disadvantages of migrating from Windows to Linux; why Linux is easier to configure for security, and why it's better suited to less technically-inclined users; how to judge whether Linux is right for you, and the issues you should consider before migrating. The author is clearly biased towards Linux, but he understands that most users will stick with Windows. Hence the emphasis on tools that run on Windows.
Chapter Seven is a catchall essay explaining security from an anecdotal point of view. There were places where it got a bit tedious, but the idea is to look at security as a process or a frame of mind, not a specific series of computer settings. The material in this section is informative in only a general sense. The real configuration information comes in chapters Two, Four, and Five.
There are several indexes with useful information on firewalls, ports, Trojan activity, sources of information, and more. Most of this information is conveniently located and linked at the author's website, BasicSec.org
Overall, the book is exceptionally well written for a tech manual. The author is a good writer and his prose flows nicely. The book is highly readable, and even witty in parts. I found myself laughing aloud on several occasions. The author has the art of The Register's irreverent presentation. I enjoyed reading it. But it is not perfect, so I give it a 9 out of 10.
My biggest criticism is that the book shifts back and forth from practice to theory and back again. It's good that readers learn the reasons for the (very sensible) procedures and settings listed; but I felt that the book was organized wrong. This is a minor issue, and the book remains exceptionally useful; but instead of interlacing the various parts, theory and practice might better have been separated in two distinct sections. It's difficult simply to flip to a section of this book and learn what needs to be done: there is a lot of theoretical talk between each practical item. It's very good talk, and very instructive talk, all right, but I would have preferred that it be located in a particular place. I would rather not have to read the entire book through in order to tweak my system for good security. Unfortunately, the author has structured the book so that a read-through is necessary.
Overall, this book will tell professionals what they need to do, and novices everything that professionals ought to know, but probably don't. It's in plain English, so no one should worry that they can't grasp it. You can make your computer, or your network, very hard to attack, whether you use Windows or Linux. This book will show you how in excellent detail. You've got to read the whole thing, unfortunately -- but it will work nicely for you, casual user and sysadmin alike.
You can purchase Computer Security for the Home and Small Office from bn.com. Slashdot welcomes readers' book reviews. To see your own review here, carefully read the book review guidelines, then visit the submission page.
The problem with security books for the home user (Score:5, Insightful)
The banner urging you to install the latest Internet optimizer or a totally free peer-to-peer app is so much more convincing.
Re:The problem with security books for the home us (Score:4, Insightful)
Re:The problem with security books for the home us (Score:2)
Re:The problem with security books for the home us (Score:1)
Re: The book is missing "dummies" in the title (Score:5, Insightful)
No, they don't. They just don't (and/or don't want to) understand all the inner workings of technology they use every day. That's true for computers, cars, kitchen appliances, VCR's, whatever.
So in terms of computer security, an average user behaves like a dummie. The book should have been named "Computer security for Dummies" or something like that, to appeal more to the target audience. Isn't this "... for dummies" series of books very popular [google.com] anyway?
Re: The book is missing "dummies" in the title (Score:2, Insightful)
When it comes to computers, security included, I would say that 90% of your average consumers (not your average /.er) does lack common sense. Before buying and/or using a computer, they should either get the proper manuals (books like the one reviewed here, though I didn't RTFA at all) or retain the services of someon
Re: The book is missing "dummies" in the title (Score:5, Insightful)
A badly programmed VCR won't do anything other than tape over something or tape the wrong thing. A microvave (for the most part) is point-and-cook. A computer is far-too multi-purpose and essential to be treated like a run-of-the mill appliance.
I'm not saying all casual users need to get certifications, but having a higher expectation of responsibility wouldn't hurt.
BUT, on the flipside, soft- and hardware makers need to be held to higher standards. Cars have to meet government standards, as do medical devices. PCs need to, also!
GTRacer
- Who do you want to DDoS Today?
Re: The book is missing "dummies" in the title (Score:2, Interesting)
To use my car analogy again, the owner needs to know how to check the oil, tranny fluid, washer fluid and how to drive it safely. They don't need to know how to replace the drive shaft.
I think the government needs to regulate for safety, which, in computer terms, basically = security. The government should re
Re: The book is missing "dummies" in the title (Score:5, Insightful)
BTW, PCs do meet certain standards, as electrical devices they need to meet certain FCC regs, of course this is not much different than an FM stereo...
Re: The book is missing "dummies" in the title (Score:2)
Re: Using PC's like appliances (Score:3, Insightful)
I suppose that is true for, say, 90% (pick your number) of users? You can try to change that, or accept it.
Changing that means: educating users. For some limited groups that might work, but I'd say experience shows that for Joe average, it doesn't. Average users, for the most part, aren't gonna change their behaviour, they're just gonna keep on browsing random websites, clicking on random e-mail attachments, pop in random disks, and run random
Re: Using PC's like appliances (Score:2)
I don't expect to see more l33t home users. What I want to see is something along the lines of PC inspection stations or checkups where every so often users have to have the machine scanned for common and new vulns, and for patch
Re: The book is missing "dummies" in the title (Score:2)
It's also possible you could kill a human using an insecure computer, you could manipulate police computers to plant evidence and place someone on death row, or you could take control of a computer control
Re: The book is missing "dummies" in the title (Score:2)
I never meant too imply I consider my machine as essential as a heart-lung machine. I was just illustrating that the risks in improper use, maintenance or design are more catastrophic for PC's than for washing machines.
And I DO go outside - twice a day in fact when I have to go to work and back. But that's about it ;)
GTRacer
- Not alabaster or cream
Re: The book is missing "dummies" in the title (Score:3, Insightful)
I'm perfectly capable of understanding most anything, give me a reference manual or a "for beginners" type of book. I'm not dumb simply because I don't have the information. I'm dumb if I'm not able to absorb the information.
Re: The book is missing "dummies" in the title (Score:2)
heh, no... You're dumb if you can't speak.
At least, that was the original meaning of the word.
Re: The book is missing "dummies" in the title (Score:2, Interesting)
No, they don't. They just don't (and/or don't want to) understand all the inner workings of technology they use every day.
Considering that most of these people have to use computers at work on a daily basis, and probably use them at home at least every few days, isn't refusing to learn about the technology, by definition, lacking common sense?
Re: The book is missing "dummies" in the title (Score:2)
Keeping up-to-date for the average user really isn't all that hard.
I'm gonna play devil's advocate here, but Microsoft does patch a whole lot of security holes with Windows Updates. How many of those viruses/exploits that they talk in the news also say "It affects unpatched Windows systems" or "Users should download the latest Windows Update to stop being vulnerable".
If the average u
Re: The book is missing "dummies" in the title (Score:2)
yes there is systems like slipstream but most home computers theses days as shipped with recovery cd, not windows install cds...
Re:The problem with security books for the home us (Score:5, Informative)
Security = extra work, confusing settings, and ways to mess things up
Insecurity = identity theft, loss of property or information, and probably cancer
It sounds like a pretty easy choice to me.
Re:The problem with security books for the home us (Score:2, Interesting)
Insecurity = identity theft, loss of property or information, and probably cancer
Well, you also have to consider that for all of the screaming privacy/security insanity on Slashdot, that security isn't important to most home users. Of course people get fucked over, but not everybody running unpatched Windows 98 is fucked. Even if a large % of users have backdoors, etc. installed, what % of those users have something worth stealing? I
The problem is massive cluelessness. (Score:2)
-----
You're talking out your ass or you'd know why those home users get targetted. The attackers don't generally want what's on the computers, they want to use the computers themselves.
They use them to send spam, hack even more computers, store files, etc. If your computer is used as a significant part of an attack (e.g. they use it to hack a DOD computer), you can expect the Feds on your doors
Marketing security. (Score:2, Insightful)
BANNER:
"Would you like to be secure from spyware? Would you like to keep the government from spying on you? Would you like to be free from unwanted advertising? How about viruses and blue screens? Click HERE to find out more."
Re:The problem with security books for the home us (Score:4, Interesting)
To whom? This sounds like a totally elitist attitude to me! I consult for a number of small business owners that depend on their computers for business. When things are explained to them so that they understand (none of this "Just do this and shut up" crap) I have never had one of them that insisted on practicing unsafe computer acts again. I suspect that more of the problem lies in presentation than in stubborn/stupid computer users!
Remember; ignorance can be cured, stupidity can't!
Re:The problem with security books for the home us (Score:4, Insightful)
We have tried to explain both nicely and in the "Just do this and shut up" way.
No matter how we try and tell them they do not care.
"Thats not my job"
I have dealt with a very wide range of users and for the most part it has nothing to do with the sysadmins presentation more the users lack of knowledge.
Re:The problem with security books for the home us (Score:2, Insightful)
Re:The problem with security books for the home us (Score:3, Insightful)
Next time his machine crashes and stays down, tell him you don't wanna hear about it.
It's cold, but if my friend told me his car's engine died because he wouldn't fix the clutch, after I'd told him what would happen if he didn't fix it, then I would just shrug and mutter: "I told you so", and let him buy a new one.
You know, people don't care about security because it does not cost them enough.
Charge $300 per hour f
Re:The problem with security books for the home us (Score:3, Funny)
Don't mean to sound like a troll, but how do stuffed clutches kill the engine? I can see how it's possible, but how common is it?
Having said that, it's been a while since I had the chance to do so much as change oil. My work gives me a car (Good Thing) but it's automatic and I'm not allowed to do any more than refill the window washer reservoir. All that stuff I used to know...
Actually, their computer use policy is much
Re:The problem with security books for the home us (Score:2)
It's not that common because without a working cluch, generally the car won't go, so it gets fixed. But a slipping clutch can stress the engine.
Re:The problem with security books for the home us (Score:2)
Re:The problem with security books for the home us (Score:3, Insightful)
Build It In or Legislate It, Don't Wait for Users (Score:2)
Imagine if someone started selling a hardware or software gizmo that promised to keep your machine free of all spam and viruses, forever, period. Imagine that this gizmo actually worked. Imagine the sales boost f
i'll be buying several copies... (Score:5, Interesting)
And save your breath about whether or not it's my job to answer such questions. I probably don't work where you do.
Re:i'll be buying several copies... (Score:2)
Actually, it's good to think that people do ask these questions. If the answers are listened to, such questioning should be encouraged.
Re:i'll be buying several copies... (Score:3, Insightful)
The book is for the "home user". Most help desk / IT shop guys get asked a lot of questions by fellow employees that are not work related, and in those cases, no prob. not his job. On the other hand, is the boss going to want to pay for these books?
Re:i'll be buying several copies... (Score:2)
that depends on how much you bill out per hour, if the "boss" is one of the users asking the questions, and if it's worth the ROI in terms of user satisfaction. in the case of most IT generalists, the cost is trivial compared to the time spent studying each individual case, or compared to giving a cold shoulder to the guys that ultimately fund your paycheck.
in a similar move, we initially bought AV software for them as well (though eventually the clien
Re:i'll be buying several copies... (Score:2)
This book should be open source (Score:5, Insightful)
Re:This book should be open source (Score:1, Insightful)
I get this a lot from my boss. My response is always one of my favorite quotes: "It isn't paranoia when they really are out to get you!"
Re:This book should be open source (Score:4, Interesting)
I didn't start this, they already had classes set up which I started helping out with, but I *did* create the class on security for average folks.
Just be prepared to supply a bit of free tech support
Re:This book should be open source (Score:1, Funny)
Re:This book should be open source (Score:1)
Other useful info at cert.org (Score:5, Insightful)
CERT.org's tips for home network security [cert.org]. It's very basic but might help.
They also offer The Home Computer Security guide [cert.org], which seems to parallel Mr. Greene's book in some key areas. This page includes a link to a pdf [cert.org] which goes into detail on the examples (encryption, firewall, anti-virus, patches, ACLs).
Point your tech support callers to these free docs - or others easily available via your favorite search engine - if the idea of a commercial book bothers you that much. Not everything has to be open source. Alternatively, why don't you write the open source manual that you need? Isn't that the idea behind F/OSS?
Re:Other useful info at cert.org (Score:2)
Re:Other useful info at cert.org (Score:2)
Re:Other useful info at cert.org (Score:2)
Re:This book should be open source (Score:2, Insightful)
If you can't explain the advantages of security without sounding paranoid, it's your problem, not the customer's.
Re:This book should be open source (Score:2)
Parent is flamebait.
Re:This book should be open source (Score:2)
I'd LOVE to be able to point one of my tech support callers to a free online version of this book.
Who wouldn't like free stuff? But since this information has obvious value to you and your tech support callers. If your time is worth something, then saving your time (by buying this book) should be worth something, too.
Oh (Score:1, Insightful)
Re:Oh (Score:5, Funny)
It contains all of the information that the average
Re:misoverestimations (Score:1)
Average user? (Score:5, Insightful)
(And so on.) It looks to me as if the book has failed completely as a guide for the average home or small office user. Your mom is the average user. Your mom plays Pogo all evening and clicks on every mail she receives. You need to explain security to her in such a way that it can fit on both sides of an index card. GnuPG? I think not.
Re:Average user? (Score:2)
Re:Average user? (Score:5, Interesting)
By out-of-touch, I mean he has no idea what an average user is, or what they're willing to do. Ethereal is next to useless as a security tool, it's a great tool for troubleshooting complex networking setups, but a box with XP Home that dials into AOL is hardly a complex network.
They might as well suggest the "average user" set up an elaborate honeynet.
A security book for the average user probably could fit on both sides on an index card, hell one side: Know what a firewall is and how to configure it. Know not to run executable code unless you trust the source. Keep your machine up to date, and scan for viruses reguarly.
That's about it, at least, thats about all I'd expect out of an average user, and that's about all I'm willing to do myself. I've never cracked out ehtereal to "secure my box". Thats ridiculous.
The "dont run executables" is a tricky one under Windows, because it's no longer clear to the average user what's executable or not. It used to be simple: files that end in
Not that it's easier for the average user to know in the unix world, where they have to "ls -l" to see if the executable bit is set.
You forgot one... (Score:2)
You forgot: "Don't use Internet Explorer or any version of Outlook." And that should have been the first one on the list.
The "dont run executables" is a tricky one under Windows
Try this variant: "Don't open any file you receive in email unless it's obviously some file you were already expecting that person to send you".
Re:Average user? (Score:2)
[shakes head] Wow, we sure are on different wavelengths.
I'll give you maybe antivirus software, avoid executing code (note: the number of things that can be "executable" is large, as you pointed out), and keeping your machine up to date. I'd also suggest use of AdAware or similar spyware remover.
Not that it's easier for the average user to know in the unix world, where they have to "ls -l" to see if the executable bit is set.
The
Re:Average user?-Hidden security. (Score:4, Informative)
Only at the expense of security.
Unless you verify key fingerprints out of band you're getting very little protection. That's not transparent and I've never found an easy way to explain it.
Then there's backing up keyrings and choosing a meaningfully strong passphrase.
A Most important home-use chapter (Score:2)
This wil
Re:A Most important home-use chapter (Score:5, Insightful)
Is it ironic, hypocritical or neither? (Score:3, Insightful)
Re:Is it ironic, hypocritical or neither? (Score:4, Informative)
And just in case you're wondering, the GNU also publishes the Free Documentation License [gnu.org].
Re:Is it ironic, hypocritical or neither? (Score:1)
Any book or article is open source anyway - you can read it completely, unless it's a research article that publishes only the results and not the raw data.
Re:Is it ironic, hypocritical or neither? (Score:1, Troll)
Re:Is it ironic, hypocritical or neither? (Score:1)
Re:Is it ironic, hypocritical or neither? (Score:2)
Re:Is it ironic, hypocritical or neither? (Score:2)
Which is completely irrelaivant and meaningless. The contents of the book could be released as a PDF file, series of HTML files, DOC file, RTF file, etc... which could be effortlessly duplicated.
But what does the effor involved to duplicate something matter?
Re:Is it ironic, hypocritical or neither? (Score:2)
Because as the amount of effort to duplicate something decreases, it's scarcity and therefore value decrease. The reason MS can sell Windows for thousands of dollars is because they impose artificial scarcity by hiding the source, which drives up cost.
If the book were released as as HTML/PDF/rtf/whatever, it too would be effortlessly duplicatable and therefore have almost no monetary cost beyond what we choose to pay for it, just as lin
Re:Is it ironic, hypocritical or neither? (Score:2)
"because the amount of effort to duplicate decreases, it's scarcity and therefore _PRICE_ decreases"
I just have this thing about being specific about "value" verses "price" in economic discussion as they are different concepts.
It looks like you meant price... but typed value. If everybody had a free copy of the book, it would still be very valuable to someone who wanted to secure their PC. The price would just be zero.
Re:Is it ironic, hypocritical or neither? (Score:1)
You're confusing a free book with Free Software. A free book costs you nothing to buy. Once you buy it, you own that physical copy of the book. You don't have the right to, say, add a chapter to it and resell (or re-giveaway) it.
With Free Software, you can do exactly that (metaphorically speaking).
Re:Is it ironic, hypocritical or neither? (Score:1)
Re:Is it ironic, hypocritical or neither? (Score:1)
Additionally, the original poster was talking about Open Source Software.
In any case, I think the original poster was probably just trolling. If not, these replies have given him/her enough to read through.
Re:Is it ironic, hypocritical or neither? (Score:2)
Main benefit I see (Score:2, Insightful)
as something to take my less computer-literate friends past the basic steps of:
->install Firefox
->install firewall.
->install a/v software (and run said software).
->install anti-spyware software (and run said software).
If it is as simple and clear as stated, it might
replace the wonderful calls I get during dinner from my new-to-computer friends/relatives along the lines of
"I was doing x to that firewall software, and
now nothing works".
And I didn't get my
something missing here... (Score:5, Interesting)
While I agree that novices probably ought to know a lot of the topics covered, there is something fundamentally missing when many (most?) novices still barely realize they have an alternative to using Windows. I interface with lots of people who basically think you have two choices - owning "a computer", or owning "a Mac" (as though owning a Mac wasn't a real computer).
The bigger problem, aside from addressing security problems, is educating the general public that they have choices, and there are different security impacts based on your choices. We live in a world where hundreds of thousands of Windows users don't even know about Windows Update, which is arguably the simplest thing you can do to avoid security vulnerabilities (yeah, yeah, I know sometimes they introduce problems through WU, but Microsoft seems to fix half a dozen "critical" security flaws per month).
So what novice out there is going to even take note that there's a book that covers security problems/issues and offers fixes for problems they're not even aware of?
Re:something missing here... (Score:3, Insightful)
I find this a bit annoying, but I would blame the software manufacturers and salesmen more than the ignorant users. How many times do you hear of a piece of software running of PC or MAC when they really mean it runs on Windows or OS X (or 9 or whatever)? I remember back when a Novell rep tried to claim that multiplatform meant Windows 98 AND
Re:something missing here... (Score:2)
Impressive link collection (Score:5, Informative)
Downloads
Linux Wipe Tools [slashdot.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.
No Messenger [slashdot.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger is absent, by an anonymous friend of The Register.
FileCheck MD5 [slashdot.org]: A free, simple, lightweight MD5 utility for Windows, courtesy of Brandon Staggs.
Errata [slashdot.org]: A text file containing my various blunders and ommissions in the book (right-click and "save as," or view as HTML [slashdot.org]). Last updated 6 June 2004.
Links to Other Goodies
Mozilla [mozilla.org]: A free, open source Web browser and e-mail client for Linux and Windows, feature rich and far more secure than Internet Explorer and Outlook Express. Recommended for novices.
Firefox [mozilla.org]: A free, open source, stand-alone Web browser for Linux and Windows. Very light and fast. Recommended for intermediate users.
Thunderbird [mozilla.org]: A free, open source e-mail and news client for Linux and Windows. Recommended for intermediate users.
GnuPG [gnupg.org]: Gnu Privacy Guard; a free, open source replacement for PGP, for Windows and Linux.
WinPT [sourceforge.net]: Windows Privacy Tools; a free, open source GUI frontend to GnuPG for Windows.
Anonymizer [anonymizer.com]: Various services for anonymous Web surfing, e-mail, chat, etc.
OpenSSH [openssh.org]: A free, open source SSH (Secure Shell) client and server for Windows and Linux.
PuTTY [greenend.org.uk]: A free, open source GUI frontend to OpenSSH for Windows.
Ethereal [ethereal.com]: A free, open source network traffic analyzer for Windows and Linux. Windows users will need to install WinPcap [polito.it] before installing Ethereal.
Ad-Aware [lavasoftusa.com]: A free, closed source adware/spyware scanner for Windows.
SpyBot Search & Destroy [safer-networking.org]: A free, closed source adware/spyware scanner for Windows.
Sam Spade [samspade.org]: CGI gateways to numerous online tools, such as whois, traceroute, etc.
SourceForge [sourceforge.net]: A vast repository of open-source software for Windows and Linux. The site can be overwhelming, but it has a search engine to help users locate packages.
GNU Project [gnu.org]: The home base of the open source movement. A repository of open source products, chiefly for UNIX-compatible systems.
Security Information
About Internet/Network Security [about.com]: An informative and useful site dealing with computer and Internet security, with reviews of security products and books, practical howtos and tips, and links to numerous tools and information resources, geared toward beginners and intermediate users.
SANS Institute [sans.org]: An educational and research organization with a vast archive of security research documents, news, and advisories, geared toward intermediate and advanced users.
CERT/CC [cert.org]: Computer Emergency Response Team Coordination Cente
Re:Impressive link collection (Score:1)
Why is Mozilla for novices and Firefox and Thunderbird for intermediate users?
Re:Impressive link collection (Score:4, Funny)
Re:Impressive link collection (Score:2)
My limited experience (Score:2)
Re:Impressive link collection (Score:3, Informative)
Yea, sorry about that, they link directly to the files on his site and thus he didn't have a "complete" link to them including the server info. Here's "fixed" links:
Linux Wipe Tools [basicsec.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.
No Messenger [basicsec.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger i
Lesson 1 Install Service Pack 2 (Score:3, Funny)
Re:Lesson 1 Install Service Pack 2 (Score:2, Insightful)
Re:Lesson 1 Install Service Pack 2 (Score:2)
Yeah, real simple, if you want to be hideously out of date.
You should upgrade your Win2k to *at least* service pack 4. Recommending users stick to sp2 is ludicrous.
there are no secrets in OSs (Score:5, Insightful)
There are not secrets... (Score:1)
If only that we true for SOs!!!! "What do you mean you use to be a man? Nah, no big deal, I'm cool with that...although I did always wonder why I caught you reading /. --that explains it."
Re:There are not secrets... (Score:3, Funny)
Sir (or madam):
That was too much information.
Macs left out. (sigh) (Score:4, Informative)
I.Q. Test (Score:2, Funny)
50 or below: Fox News, CNN, MSNBC, Hotmail, any
75 or below: Microsoft, Dell, Compaq, etc.
100 or Below: Slashdot, any
125 or Below: Any
150 or below: Apple.com
Pfeh. Letting blind people drive. Why, oh why are there so many accidents??
Dummies Guides already do all this, better too... (Score:3, Informative)
Well, that would be a first I suppose, him and Orlowski (sp?) are the two biggest problems the reg has IMHO.
For my money when there is already stuff like the Dummies Guide to Network Security (www.dummies.com) why bother?
For those that asked for online articles
http://www.dummies.com/WileyCDA/Dummies
http://www.dummies.c
http://www.dummies.c
etc etc
Re:Dummies Guides already do all this, better too. (Score:1)
>Well, that would be a first I suppose, him and Orlowski (sp?) are the two biggest problems the reg has IMHO.
Disagree, Greene is a great writer and has written excellent articles for the register explaining to newbies [theregister.co.uk] and power users [theregister.co.uk] how to secure linux You could say its "insightful" and maybe even "instructive"...
Re:Dummies Guides already do all this, better too. (Score:2)
"I loathe Microsoft, adore Linux, loathe Feds, adore soldiers, loathe cops, adore firefighters"
yeah, I can see why slashdotters like the guy, the first 5 words alone are enough...
Fact is _I_ have never seen anything insightful or instructive from his pen, mainly perhaps because I have never seen anything original from his pen, it all appears to be stuff he has read elsewhere (same places as me perhaps) and then reworded and revamped himself... this
replying to myself, re linux security (Score:2)
Fact is green's articles on linux security are IMHO a joke, I have been asked the same question, any MY answer was thus.
"Get yourself a laptop, cpu not too important but make sure it has at least 512 meg of ram, pull the hard disk and sell it on ebay, now get yourself a couple of usb flash disks, make sure everything written to them is STRONGLY encrypted, now stick a 802 card in the pcmcia slot, now stick a knoppix live-cd in, now go somewhere where there is "war" type access and only then boot it up and d
Security Book? (Score:2)
Review of the review. (Score:4, Funny)
description of the preface.
The third paragraph describes the first chapter.
The fourth paragraph describes the second chapter.
The fifth paragraph describes the third chapter.
The sixth paragraph describes the fourth chapter.
The seventh paragraph describes the fifth chapter.
The eight paragraph describes the sixth chapter.
The ninth paragraph describes the seventh chapter.
The tenth paragraph notes there are indexes.
Overall this review is skeletal at best.
I give it a 3 out of 10.
Overall, this review is useful for nearly some people, not so useful for others. It's
certainly written in English, so more than half of Slashdot's
readership will feel a vague sense of familiarity.
Impact (Score:3, Insightful)
Unless there's a widespread and media popularized outbreak of identity theft, or computer hijacking, or people who can't check their e-mail or browse the web, then computer security will continue to be perceived as a topic of paranoia.
Currently the impact of computer insecurity is considered to be an annoyance. Extrapolated damages of corporate insecurity are given the same regard as the extrapolated damages of trading mp3s. Until authorities take a tough stance on abusive network activities (spam, browser hijacking, unwanted pop-up advertising, unauthorized collection of consumer data) then the general populance will continue to accept a loose attitude towards computer security.
The fact is that insecurity is profitable as a business. There's no real motivation to protect the consumers so why should the consumers waste effort protecting themselves?
Network monitoring (Score:3, Insightful)
If you're talking about Joe User, you need to stick to what works under Windows. Last time I checked, Ethereal on win32 platforms only worked on LAN (eth) adapters and not dialup connections. If you've got a cable modem or DSL hooked up via an ethernet adapter, then it's a viable option. I'll agree about netstat, but I really don't think I'd be able to teach my a non-technical person how to interperet the output -- even given a book with examples, a non-techie really doesn't stand much chance tracing down what programs have what ports open.
As far as monitoring open connections on a win32 box, I'd heartily recommend TCPView [sysinternals.com]. It's capable of printing out information on all connections, their states and what processes they're associated with. Very powerful tool, and I can talk my mom through using it over the phone, even sending my the results via email.
Re:Why am I seeing this? (Score:2)
See the two icons listed beside the story; a lock and a stapler? Hover your mouse over each picture, and you'll see what the story is listed as; in this case 'security' and 'IT.'