Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Books Media Book Reviews

Computer Security for the Home and Small Office 146

Andrew Murphy writes " The Register's security guru Thomas Greene has written a book for the average computer user, though it contains a great deal of information that professionals need to know. It's insightful, instructive, and calls for open source software even on Windows for enhanced security. The single most interesting feature is the author's emphasis on open source software as a security feature per se. He rightly notes that there are no secrets in OSs, and teaches users to leverage this transparency regardless of their platform. As early as the introduction, Mozilla is urged as a secure replacement for IE and OE, and this came before the Scob outbreak." Read on for the rest of Murphy's review.
Computer Security for the Home and Small Office
author Thomas C. Greene
pages 405
publisher Apress
rating 9
reviewer Andrew Murphy
ISBN 1590593162
summary No secrets means that open source software, when it survives, tends toward robustness -- so it can help even if you run a closed-source operating system.

The book covers popular OSs replacements for Windows applications and utilities; it explains vulnerabilities; it offers practical setup information for both Windows and Linux to harden a system and make it extremely difficult to attack.

The Preface describes the book in general terms. The Introduction explains firewalls and their limitations, and explains how to install Mozilla to limit email and http exploits and spam.

Chapter One debunks the malicious-hacker mythology and shows that most so-called hackers are only script kiddies who are easily thwarted with commonsense tactics.

Chapter Two explains malware, spyware, bad system configurations, and the scores of other routes to system exploitation and privacy invasion that firewalls and antivirus software don't address. It includes a step-by-step guide to simplifying and hardening a system. Most importantly, it offers a useful guide to turning off unnecessary services and networking components for both Windows and Linux, and setting sensible user permissions, and is liberally illustrated with screen shots.

Chapter Three offers a good breakdown of social engineering and phishing scams, and how to defend against them.

Chapter Four is about using common tools, like Ethereal, Netstat, PGP, etc. It explains how to monitor an Internet connection to spot software secretly reaching out or phoning home to remote servers; how to monitor your system for signs of malicious processes; and how to use PGP and GnuPG to encrypt sensitive files and Internet correspondence. This is one of the best introductions to using encryption available anywhere.

Chapter Five explains how to eliminate all traces of Web activity from your computer and defeat forensic recovery of stored data; how to surf the Web anonymously using an encrypted connection and defeat remote monitoring; how to set up and use SSH (SecureShell) to conceal both your identity, and the data content of your Internet sessions from all third parties, including your ISP. The many hiding places of sensitive or incriminating data are revealed for both Windows and Linux users.

Chapter Six explains the advantages and disadvantages of migrating from Windows to Linux; why Linux is easier to configure for security, and why it's better suited to less technically-inclined users; how to judge whether Linux is right for you, and the issues you should consider before migrating. The author is clearly biased towards Linux, but he understands that most users will stick with Windows. Hence the emphasis on tools that run on Windows.

Chapter Seven is a catchall essay explaining security from an anecdotal point of view. There were places where it got a bit tedious, but the idea is to look at security as a process or a frame of mind, not a specific series of computer settings. The material in this section is informative in only a general sense. The real configuration information comes in chapters Two, Four, and Five.

There are several indexes with useful information on firewalls, ports, Trojan activity, sources of information, and more. Most of this information is conveniently located and linked at the author's website, BasicSec.org

Overall, the book is exceptionally well written for a tech manual. The author is a good writer and his prose flows nicely. The book is highly readable, and even witty in parts. I found myself laughing aloud on several occasions. The author has the art of The Register's irreverent presentation. I enjoyed reading it. But it is not perfect, so I give it a 9 out of 10.

My biggest criticism is that the book shifts back and forth from practice to theory and back again. It's good that readers learn the reasons for the (very sensible) procedures and settings listed; but I felt that the book was organized wrong. This is a minor issue, and the book remains exceptionally useful; but instead of interlacing the various parts, theory and practice might better have been separated in two distinct sections. It's difficult simply to flip to a section of this book and learn what needs to be done: there is a lot of theoretical talk between each practical item. It's very good talk, and very instructive talk, all right, but I would have preferred that it be located in a particular place. I would rather not have to read the entire book through in order to tweak my system for good security. Unfortunately, the author has structured the book so that a read-through is necessary.

Overall, this book will tell professionals what they need to do, and novices everything that professionals ought to know, but probably don't. It's in plain English, so no one should worry that they can't grasp it. You can make your computer, or your network, very hard to attack, whether you use Windows or Linux. This book will show you how in excellent detail. You've got to read the whole thing, unfortunately -- but it will work nicely for you, casual user and sysadmin alike.


You can purchase Computer Security for the Home and Small Office from bn.com. Slashdot welcomes readers' book reviews. To see your own review here, carefully read the book review guidelines, then visit the submission page.

This discussion has been archived. No new comments can be posted.

Computer Security for the Home and Small Office

Comments Filter:
  • by prostoalex ( 308614 ) on Wednesday August 11, 2004 @01:32PM (#9941665) Homepage Journal
    ...is that few people ever read them.

    The banner urging you to install the latest Internet optimizer or a totally free peer-to-peer app is so much more convincing.
    • by CrazyTiger ( 797612 ) on Wednesday August 11, 2004 @01:35PM (#9941698)
      Exactly.Too many people lack common sense.The only people with common sense (like us) go online to get info for free.
      • yeah but each of us that gets it for free knows a guy who does nothing but buy brand new tech manuals and then stuff them under the passenger seat of their car three nights later.
      • Definitely. Free information online is teh best and guaranteed reliable or your MONEY BACK!
      • by Alwin Henseler ( 640539 ) on Wednesday August 11, 2004 @02:05PM (#9941981)
        Too many people lack common sense.

        No, they don't. They just don't (and/or don't want to) understand all the inner workings of technology they use every day. That's true for computers, cars, kitchen appliances, VCR's, whatever.

        So in terms of computer security, an average user behaves like a dummie. The book should have been named "Computer security for Dummies" or something like that, to appeal more to the target audience. Isn't this "... for dummies" series of books very popular [google.com] anyway?

        • But if you lack the understanding of the inner workings of your car, you go to a mechanic or, even better, buy a book to learn all about it so you can fix it yourself. This is common sense.

          When it comes to computers, security included, I would say that 90% of your average consumers (not your average /.er) does lack common sense. Before buying and/or using a computer, they should either get the proper manuals (books like the one reviewed here, though I didn't RTFA at all) or retain the services of someon

          • But here's the rub, at least as I see it...The average person treats a PC like a VCR, as an appliance. However, they need to treat a PC like a heart-lung machine. At least in terms of respecting the danger that misuse can bring.

            A badly programmed VCR won't do anything other than tape over something or tape the wrong thing. A microvave (for the most part) is point-and-cook. A computer is far-too multi-purpose and essential to be treated like a run-of-the mill appliance.

            I'm not saying all casual users need to get certifications, but having a higher expectation of responsibility wouldn't hurt.

            BUT, on the flipside, soft- and hardware makers need to be held to higher standards. Cars have to meet government standards, as do medical devices. PCs need to, also!

            GTRacer
            - Who do you want to DDoS Today?

            • Do you really think it's a hardware issue? I think that we should leave hardware the way it is. Most people have no idea what's in the case of the computer and really, they have no need to know.

              To use my car analogy again, the owner needs to know how to check the oil, tranny fluid, washer fluid and how to drive it safely. They don't need to know how to replace the drive shaft.

              I think the government needs to regulate for safety, which, in computer terms, basically = security. The government should re

            • It is more like a car or boat. It needs regular maintance; while misuse is not lethal yet, it can have legal ramifications; and a certain amount of training is needed to just use them.

              BTW, PCs do meet certain standards, as electrical devices they need to meet certain FCC regs, of course this is not much different than an FM stereo...
            • The average person treats a PC like a VCR, as an appliance.

              I suppose that is true for, say, 90% (pick your number) of users? You can try to change that, or accept it.

              Changing that means: educating users. For some limited groups that might work, but I'd say experience shows that for Joe average, it doesn't. Average users, for the most part, aren't gonna change their behaviour, they're just gonna keep on browsing random websites, clicking on random e-mail attachments, pop in random disks, and run random

              • Well, when you get down to it, probably 75 or 80 percent of people treat their cars as an appliance. So since most people can't be bothered to check on things BEFORE the breakdown, many states and governments do the checking for them during scheduled inspections for tag renewal.

                I don't expect to see more l33t home users. What I want to see is something along the lines of PC inspection stations or checkups where every so often users have to have the machine scanned for common and new vulns, and for patch

        • As an aside, I refuse to buy any "For Dummies" or "For Idiots" books, because I don't believe I am either.
          I'm perfectly capable of understanding most anything, give me a reference manual or a "for beginners" type of book. I'm not dumb simply because I don't have the information. I'm dumb if I'm not able to absorb the information.
        • Too many people lack common sense.

          No, they don't. They just don't (and/or don't want to) understand all the inner workings of technology they use every day.


          Considering that most of these people have to use computers at work on a daily basis, and probably use them at home at least every few days, isn't refusing to learn about the technology, by definition, lacking common sense?
    • by lukewarmfusion ( 726141 ) on Wednesday August 11, 2004 @01:38PM (#9941735) Homepage Journal
      The parent post is actually insightful (as well as funny). So many of us have tried to tell our parents, friends, relatives - even complete strangers - about the importance of security. But they still download Kazaa (not lite), they still choose a password named after their dog, and they still open every damn attachment they get.

      Security = extra work, confusing settings, and ways to mess things up
      Insecurity = identity theft, loss of property or information, and probably cancer

      It sounds like a pretty easy choice to me.
      • Security = extra work, confusing settings, and ways to mess things up

        Insecurity = identity theft, loss of property or information, and probably cancer


        Well, you also have to consider that for all of the screaming privacy/security insanity on Slashdot, that security isn't important to most home users. Of course people get fucked over, but not everybody running unpatched Windows 98 is fucked. Even if a large % of users have backdoors, etc. installed, what % of those users have something worth stealing? I
        • Even if a large % of users have backdoors, etc. installed, what % of those users have something worth stealing?
          -----

          You're talking out your ass or you'd know why those home users get targetted. The attackers don't generally want what's on the computers, they want to use the computers themselves.

          They use them to send spam, hack even more computers, store files, etc. If your computer is used as a significant part of an attack (e.g. they use it to hack a DOD computer), you can expect the Feds on your doors
    • by Anonymous Coward
      "The banner urging you to install the latest Internet optimizer or a totally free peer-to-peer app is so much more convincing."

      BANNER:
      "Would you like to be secure from spyware? Would you like to keep the government from spying on you? Would you like to be free from unwanted advertising? How about viruses and blue screens? Click HERE to find out more."
    • by Anonymous Coward on Wednesday August 11, 2004 @01:45PM (#9941799)
      The banner urging you to install the latest Internet optimizer or a totally free peer-to-peer app is so much more convincing.

      To whom? This sounds like a totally elitist attitude to me! I consult for a number of small business owners that depend on their computers for business. When things are explained to them so that they understand (none of this "Just do this and shut up" crap) I have never had one of them that insisted on practicing unsafe computer acts again. I suspect that more of the problem lies in presentation than in stubborn/stupid computer users!

      Remember; ignorance can be cured, stupidity can't!
      • by buchan232 ( 655996 ) on Wednesday August 11, 2004 @02:27PM (#9942154)
        Nope I'm sorry but the original poster is right. The users I deal with day in and day out want NOTHING to do with security.
        We have tried to explain both nicely and in the "Just do this and shut up" way.

        No matter how we try and tell them they do not care.

        "Thats not my job"

        I have dealt with a very wide range of users and for the most part it has nothing to do with the sysadmins presentation more the users lack of knowledge.
      • Unfortunately, it's true. My father runs a small business and is constantly plagued by spyware, malware, viruses and so on. I've tried and tried and tried and tried to get him to switch to Firefox and Thunderbird. Even after running Spybot and showing him how much spyware he had on his system, he has yet to switch over. This isn't a matter of him not knowing how things work, or understanding the technical end of things. He simply doesn't want to deal with a process that he thinks (no matter what I tell him
        • Tell him you'll not help him with his computers anymore until he uses firefox+Thunderbird.

          Next time his machine crashes and stays down, tell him you don't wanna hear about it.

          It's cold, but if my friend told me his car's engine died because he wouldn't fix the clutch, after I'd told him what would happen if he didn't fix it, then I would just shrug and mutter: "I told you so", and let him buy a new one.

          You know, people don't care about security because it does not cost them enough.

          Charge $300 per hour f
          • ...if my friend told me his car's engine died because he wouldn't fix the clutch...

            Don't mean to sound like a troll, but how do stuffed clutches kill the engine? I can see how it's possible, but how common is it?

            Having said that, it's been a while since I had the chance to do so much as change oil. My work gives me a car (Good Thing) but it's automatic and I'm not allowed to do any more than refill the window washer reservoir. All that stuff I used to know...

            Actually, their computer use policy is much

    • In my opinion, the real problem is that computers aren't MADE for the average user. An average user should not have to worry about firewalls, security exploits and the like, just like an average driver does not have to worry that his engine or breaks might malfunction.
    • Few of us read books about auto safety, either, but automobiles and the roads they travel on are demonstrably safer than in years past. This happened because manufacturers designed and built safer cars. Sometimes legislation mandated those improvements, other times the market mandated the changes.

      Imagine if someone started selling a hardware or software gizmo that promised to keep your machine free of all spam and viruses, forever, period. Imagine that this gizmo actually worked. Imagine the sales boost f
  • by wwest4 ( 183559 ) on Wednesday August 11, 2004 @01:33PM (#9941675)
    ...at the company's expense. Everyone stumbles into the IT office and asks these questions, and the answer doesn't exactly fit in an FAQ because everyone has a slightly different situation.

    And save your breath about whether or not it's my job to answer such questions. I probably don't work where you do.
    • And save your breath about whether or not it's my job to answer such questions. I probably don't work where you do.

      Actually, it's good to think that people do ask these questions. If the answers are listened to, such questioning should be encouraged.

  • by TheSpoom ( 715771 ) * <slashdot@@@uberm00...net> on Wednesday August 11, 2004 @01:34PM (#9941680) Homepage Journal
    Really, I'd LOVE to be able to point one of my tech support callers to a free online version of this book. It would be very helpful because I wouldn't have to explain to them why Firefox is better than Internet Explorer, and then have them think I'm just paranoid when I tell them all the ways spyware can get in their system.
    • by Anonymous Coward
      ...and then have them think I'm just paranoid when I tell them all the ways spyware can get in their system.

      I get this a lot from my boss. My response is always one of my favorite quotes: "It isn't paranoia when they really are out to get you!"
    • by Anonymous Coward on Wednesday August 11, 2004 @01:48PM (#9941826)
      Try doing what I do--I teach a free class, open to the public, at our local library.

      I didn't start this, they already had classes set up which I started helping out with, but I *did* create the class on security for average folks.

      Just be prepared to supply a bit of free tech support :)
    • This birngs up another good question... Are there any open source books on security (I haven't ever really looked)? I would guess that even if there are, they aren't aimed and the "home" or casual user.
    • by sczimme ( 603413 ) on Wednesday August 11, 2004 @02:08PM (#9942006)

      CERT.org's tips for home network security [cert.org]. It's very basic but might help.

      They also offer The Home Computer Security guide [cert.org], which seems to parallel Mr. Greene's book in some key areas. This page includes a link to a pdf [cert.org] which goes into detail on the examples (encryption, firewall, anti-virus, patches, ACLs).

      Point your tech support callers to these free docs - or others easily available via your favorite search engine - if the idea of a commercial book bothers you that much. Not everything has to be open source. Alternatively, why don't you write the open source manual that you need? Isn't that the idea behind F/OSS?
      • Point your tech support callers to these free docs - or others...
        I frequently pass along Schneier's 3-year-old Safe Personal Computing [schneier.com] essay from Crypto-Gram as a good initial set of steps to take coupled with good long-term recommendations (don't use MSIE, don't use Windows).
    • If a tech support guy ever did that to me, I'd make sure he got fired for it. That is not doing your job, that is shirking your duty. If you're getting paid to do tech support, you better damn well be ready to give tech support, not say "RTFM, lamer."

      If you can't explain the advantages of security without sounding paranoid, it's your problem, not the customer's.

    • I'd LOVE to be able to point one of my tech support callers to a free online version of this book.

      Who wouldn't like free stuff? But since this information has obvious value to you and your tech support callers. If your time is worth something, then saving your time (by buying this book) should be worth something, too.
  • Oh (Score:1, Insightful)

    So basically, this book contains all the information that the average /. reader already knows.
  • Average user? (Score:5, Insightful)

    by scowling ( 215030 ) on Wednesday August 11, 2004 @01:37PM (#9941716) Homepage
    Chapter Four is about using common tools, like Ethereal, Netstat, PGP, etc. It explains how to monitor an Internet connection to spot software secretly reaching out or phoning home to remote servers; how to monitor your system for signs of malicious processes; and how to use PGP and GnuPG to encrypt sensitive files and Internet correspondence. This is one of the best introductions to using encryption available anywhere.

    (And so on.) It looks to me as if the book has failed completely as a guide for the average home or small office user. Your mom is the average user. Your mom plays Pogo all evening and clicks on every mail she receives. You need to explain security to her in such a way that it can fit on both sides of an index card. GnuPG? I think not.
    • You're right. But I still advocate a book of this sort because it targets a second tier of power users who are competent, if not truly advanced/pro. They can read the book and coddle the cluebies. Many who might call themselves advanced or professional find themselves in the potentially insufferable position of being responsible for answering questions like these. Some natural teacher/prophet types may love it, I'm sure, but for those who don't, this book is a means to delegate to the "power users."

    • Re:Average user? (Score:5, Interesting)

      by stratjakt ( 596332 ) on Wednesday August 11, 2004 @02:10PM (#9942021) Journal
      Well, as the lead-in says, this was written by the "guru at theregister.com", or translated, by an out-of-touch linux zealot.

      By out-of-touch, I mean he has no idea what an average user is, or what they're willing to do. Ethereal is next to useless as a security tool, it's a great tool for troubleshooting complex networking setups, but a box with XP Home that dials into AOL is hardly a complex network.

      They might as well suggest the "average user" set up an elaborate honeynet.

      A security book for the average user probably could fit on both sides on an index card, hell one side: Know what a firewall is and how to configure it. Know not to run executable code unless you trust the source. Keep your machine up to date, and scan for viruses reguarly.

      That's about it, at least, thats about all I'd expect out of an average user, and that's about all I'm willing to do myself. I've never cracked out ehtereal to "secure my box". Thats ridiculous.

      The "dont run executables" is a tricky one under Windows, because it's no longer clear to the average user what's executable or not. It used to be simple: files that end in .bat, .com or .exe. Now it could be .vbs or a macro in a .doc or .xls. How many average users know what .msi means?

      Not that it's easier for the average user to know in the unix world, where they have to "ls -l" to see if the executable bit is set.
      • Know what a firewall is and how to configure it. Know not to run executable code unless you trust the source. Keep your machine up to date, and scan for viruses reguarly.

        You forgot: "Don't use Internet Explorer or any version of Outlook." And that should have been the first one on the list.

        The "dont run executables" is a tricky one under Windows

        Try this variant: "Don't open any file you receive in email unless it's obviously some file you were already expecting that person to send you".
      • You think personal firewalls are a good idea from a security standpoint?

        [shakes head] Wow, we sure are on different wavelengths.

        I'll give you maybe antivirus software, avoid executing code (note: the number of things that can be "executable" is large, as you pointed out), and keeping your machine up to date. I'd also suggest use of AdAware or similar spyware remover.

        Not that it's easier for the average user to know in the unix world, where they have to "ls -l" to see if the executable bit is set.

        The
  • IMO is Ch5: Chapter Five explains how to eliminate all traces of Web activity from your computer and defeat forensic recovery of stored data; how to surf the Web anonymously using an encrypted connection and defeat remote monitoring; how to set up and use SSH (SecureShell) to conceal both your identity, and the data content of your Internet sessions from all third parties, including your ISP. The many hiding places of sensitive or incriminating data are revealed for both Windows and Linux users.

    This wil
    • by Pidder ( 736678 ) on Wednesday August 11, 2004 @01:55PM (#9941889)
      Just because the book contains more advanced topics doesn't mean it can't be aimed at the casual user. To me it seems that the book is aimed at the casual but interested user. Someone who's not the least interested in security will not pick this up no matter how basic it is. As Joe Sixpack starts reading this book he will learn more and more and by the time he comes to chapter 5 he will hardly be Joe Sixpack anymore.
  • by Soukyan ( 613538 ) * on Wednesday August 11, 2004 @01:37PM (#9941723)
    An open source advocate won't just give away the book for free. So why again should source code be made free? Just a thought.
    • by TheSpoom ( 715771 ) * <slashdot@@@uberm00...net> on Wednesday August 11, 2004 @01:44PM (#9941786) Homepage Journal
      That's the classic "free as in beer vs. free as in freedom" argument, and has been argued on Slashdot too many times to count. Just take a look at the GNU philosophy [gnu.org] section for the answer to your question.

      And just in case you're wondering, the GNU also publishes the Free Documentation License [gnu.org].
    • Open source software != free of cost.

      Any book or article is open source anyway - you can read it completely, unless it's a research article that publishes only the results and not the raw data.
      • But if I were to take the book and reprint it under another name and ad a few chapters of my own and then proceed to sell it? Does open source not advocate this sort of use of source code? Are we speaking specifically of GNU or are we talking true open-source? I appreciate the replies and I understand those aspects, but while you can reference another's material in the book world, you can never legally profit from it. Also, open source licensing is ripe to turn into a quagmire of different types and freedom
    • Because a book is a real-world item that is not effortlessly duplicated by every general purpose computer in existance.
      • Because a book is a real-world item that is not effortlessly duplicated by every general purpose computer in existance.

        Which is completely irrelaivant and meaningless. The contents of the book could be released as a PDF file, series of HTML files, DOC file, RTF file, etc... which could be effortlessly duplicated.

        But what does the effor involved to duplicate something matter?

        • "But what does the effort involved to duplicate something matter?"

          Because as the amount of effort to duplicate something decreases, it's scarcity and therefore value decrease. The reason MS can sell Windows for thousands of dollars is because they impose artificial scarcity by hiding the source, which drives up cost.

          If the book were released as as HTML/PDF/rtf/whatever, it too would be effortlessly duplicatable and therefore have almost no monetary cost beyond what we choose to pay for it, just as lin
          • You may want to word it as:

            "because the amount of effort to duplicate decreases, it's scarcity and therefore _PRICE_ decreases"

            I just have this thing about being specific about "value" verses "price" in economic discussion as they are different concepts.

            It looks like you meant price... but typed value. If everybody had a free copy of the book, it would still be very valuable to someone who wanted to secure their PC. The price would just be zero.
    • You're confusing a free book with Free Software. A free book costs you nothing to buy. Once you buy it, you own that physical copy of the book. You don't have the right to, say, add a chapter to it and resell (or re-giveaway) it.

      With Free Software, you can do exactly that (metaphorically speaking).

      • Actually, you're talking Open Source Software, not Free Software. Free Software, or Freeware, is something that is available for you to use free of charge. It doesn't entitle you to view the source code, it only says that you can use it for free. Open Source means that you can take the code, modify it and then redistribute it.
        • Correct, but "Open Source" is a kind of "Free" software. If I had meant Freeware, I would've either said "Freeware," or "free software." Small F, and not just a semantic difference.

          Additionally, the original poster was talking about Open Source Software.

          In any case, I think the original poster was probably just trolling. If not, these replies have given him/her enough to read through.
    • While he won't give you a paper copy of his books for free (limited commons), Eric S. Raymond [catb.org], another open source advocate, publishes his paper books online for free - as in beer and speech. Some (all?) are under a Creative Commons license.
  • Main benefit I see (Score:2, Insightful)

    by Anonymous Coward
    I see the main benefit of a book like this
    as something to take my less computer-literate friends past the basic steps of:
    ->install Firefox
    ->install firewall.
    ->install a/v software (and run said software).
    ->install anti-spyware software (and run said software).
    If it is as simple and clear as stated, it might
    replace the wonderful calls I get during dinner from my new-to-computer friends/relatives along the lines of
    "I was doing x to that firewall software, and
    now nothing works".

    And I didn't get my
  • by kaan ( 88626 ) on Wednesday August 11, 2004 @01:43PM (#9941781)
    "Overall, this book will tell professionals what they need to do, and novices everything that professioanls ought to know, but probably don't."

    While I agree that novices probably ought to know a lot of the topics covered, there is something fundamentally missing when many (most?) novices still barely realize they have an alternative to using Windows. I interface with lots of people who basically think you have two choices - owning "a computer", or owning "a Mac" (as though owning a Mac wasn't a real computer).

    The bigger problem, aside from addressing security problems, is educating the general public that they have choices, and there are different security impacts based on your choices. We live in a world where hundreds of thousands of Windows users don't even know about Windows Update, which is arguably the simplest thing you can do to avoid security vulnerabilities (yeah, yeah, I know sometimes they introduce problems through WU, but Microsoft seems to fix half a dozen "critical" security flaws per month).

    So what novice out there is going to even take note that there's a book that covers security problems/issues and offers fixes for problems they're not even aware of?
    • "I interface with lots of people who basically think you have two choices - owning "a computer", or owning "a Mac" (as though owning a Mac wasn't a real computer)."

      I find this a bit annoying, but I would blame the software manufacturers and salesmen more than the ignorant users. How many times do you hear of a piece of software running of PC or MAC when they really mean it runs on Windows or OS X (or 9 or whatever)? I remember back when a Novell rep tried to claim that multiplatform meant Windows 98 AND
  • by Anonymous Coward on Wednesday August 11, 2004 @01:45PM (#9941798)
    Just in case his site gets /.'ed, here is his impressive list of links. - Jonah Hex in non-karma whore mode.
    Downloads
    Linux Wipe Tools [slashdot.org]: Three shell scripts for securely wiping all data from the swap partition, wiping unused disk space on the root partition, or wiping an entire disk, by Thomas C. Greene.

    No Messenger [slashdot.org]: A batch file that eliminates Windows Messenger and fixes the problem of Outlook Express loading slowly when Messenger is absent, by an anonymous friend of The Register.

    FileCheck MD5 [slashdot.org]: A free, simple, lightweight MD5 utility for Windows, courtesy of Brandon Staggs.

    Errata [slashdot.org]: A text file containing my various blunders and ommissions in the book (right-click and "save as," or view as HTML [slashdot.org]). Last updated 6 June 2004.

    Links to Other Goodies
    Mozilla [mozilla.org]: A free, open source Web browser and e-mail client for Linux and Windows, feature rich and far more secure than Internet Explorer and Outlook Express. Recommended for novices.

    Firefox [mozilla.org]: A free, open source, stand-alone Web browser for Linux and Windows. Very light and fast. Recommended for intermediate users.

    Thunderbird [mozilla.org]: A free, open source e-mail and news client for Linux and Windows. Recommended for intermediate users.

    GnuPG [gnupg.org]: Gnu Privacy Guard; a free, open source replacement for PGP, for Windows and Linux.

    WinPT [sourceforge.net]: Windows Privacy Tools; a free, open source GUI frontend to GnuPG for Windows.

    Anonymizer [anonymizer.com]: Various services for anonymous Web surfing, e-mail, chat, etc.

    OpenSSH [openssh.org]: A free, open source SSH (Secure Shell) client and server for Windows and Linux.

    PuTTY [greenend.org.uk]: A free, open source GUI frontend to OpenSSH for Windows.

    Ethereal [ethereal.com]: A free, open source network traffic analyzer for Windows and Linux. Windows users will need to install WinPcap [polito.it] before installing Ethereal.

    Ad-Aware [lavasoftusa.com]: A free, closed source adware/spyware scanner for Windows.

    SpyBot Search & Destroy [safer-networking.org]: A free, closed source adware/spyware scanner for Windows.

    Sam Spade [samspade.org]: CGI gateways to numerous online tools, such as whois, traceroute, etc.

    SourceForge [sourceforge.net]: A vast repository of open-source software for Windows and Linux. The site can be overwhelming, but it has a search engine to help users locate packages.

    GNU Project [gnu.org]: The home base of the open source movement. A repository of open source products, chiefly for UNIX-compatible systems.

    Security Information
    About Internet/Network Security [about.com]: An informative and useful site dealing with computer and Internet security, with reviews of security products and books, practical howtos and tips, and links to numerous tools and information resources, geared toward beginners and intermediate users.

    SANS Institute [sans.org]: An educational and research organization with a vast archive of security research documents, news, and advisories, geared toward intermediate and advanced users.

    CERT/CC [cert.org]: Computer Emergency Response Team Coordination Cente
    • Why is Mozilla for novices and Firefox and Thunderbird for intermediate users?

    • Unfortunately I use Windows at work. I use WinPT and Putty frequently. They're great apps, although they're a bit unpolished. I know little of networking and security and have no problems using them. But I'm a developer. I think an average user would have a problem using either. They're both for people who know what GnuPG and OpenSSH are and how to use them. They don't hide the details, which is a good thing in general, but hard for beginners. I think an average user might get by with WinPT since it
  • by Raindeer ( 104129 ) on Wednesday August 11, 2004 @01:47PM (#9941815) Homepage Journal
    Simple
    • Perhaps not so simple. I'm gonna go ahead and make the assumption that a large number of people will have(have had) serious stability issues as a result of SP2. Remember the 3 out of 5 figure that everyone blew off because it was related to some malware that's incompatible with SP2? Well most users have malware on their machines, that's just the way it is. They don't know or care enough to remove it, or buy this book. And if they install SP2, all they'll know is that their computer no longer wokrs.
    • > Simple

      Yeah, real simple, if you want to be hideously out of date.

      You should upgrade your Win2k to *at least* service pack 4. Recommending users stick to sp2 is ludicrous.

  • by Junior J. Junior III ( 192702 ) on Wednesday August 11, 2004 @01:55PM (#9941899) Homepage
    There are no secrets on library shelves, either, but if the populace never signs out a book and actually reads it, or if they try to read it and can't understand the language, what good does that do them? OSS isn't inherently secure. It has the opportunity to be peer-reviewed and pronounced "secure" by the peer reviewers. And even they can be wrong, if they're not clever enough to spot a hole.
  • He rightly notes that there are no secrets in OSs

    If only that we true for SOs!!!! "What do you mean you use to be a man? Nah, no big deal, I'm cool with that...although I did always wonder why I caught you reading /. --that explains it."

    • "What do you mean you use to be a man? Nah, no big deal, I'm cool with that...although I did always wonder why I caught you reading /. --that explains it."

      Sir (or madam):
      That was too much information.

  • by tb3 ( 313150 ) on Wednesday August 11, 2004 @02:11PM (#9942027) Homepage
    It's a pity he covers Windows and Linux but completely ignores Macs. (I checked his website; I'm sure). There must be the same number of home/office users of Macs as Linux, probably more. Although the Mac is secure against spyware, malware and viruses at present, it would be useful to inform people about security considerations for the Mac, how the built-in firewall works, and so forth.
  • I.Q. Test (Score:2, Funny)

    by Anonymous Coward
    A more secure home user? Simple. Make Internet use dependant on the user's I.Q.

    50 or below: Fox News, CNN, MSNBC, Hotmail, any .gov
    75 or below: Microsoft, Dell, Compaq, etc.
    100 or Below: Slashdot, any .net
    125 or Below: Any .com, save....
    150 or below: Apple.com

    Pfeh. Letting blind people drive. Why, oh why are there so many accidents??
  • by GuyFawkes ( 729054 ) on Wednesday August 11, 2004 @02:19PM (#9942088) Homepage Journal
    Tom Greene writing something insightful and instructive?

    Well, that would be a first I suppose, him and Orlowski (sp?) are the two biggest problems the reg has IMHO.

    For my money when there is already stuff like the Dummies Guide to Network Security (www.dummies.com) why bother?

    For those that asked for online articles
    http://www.dummies.com/WileyCDA/DummiesA rticle/id- 1983,subcat-NETWORKING.html
    http://www.dummies.co m/WileyCDA/DummiesArticle/id- 1808,subcat-NETWORKING.html
    http://www.dummies.co m/WileyCDA/DummiesArticle/id- 1518,subcat-NETWORKING.html

    etc etc
    • >Tom Greene writing something insightful and instructive?

      >Well, that would be a first I suppose, him and Orlowski (sp?) are the two biggest problems the reg has IMHO.

      Disagree, Greene is a great writer and has written excellent articles for the register explaining to newbies [theregister.co.uk] and power users [theregister.co.uk] how to secure linux You could say its "insightful" and maybe even "instructive"...
      • A quote from Mr Greene himself, speaking about himself.

        "I loathe Microsoft, adore Linux, loathe Feds, adore soldiers, loathe cops, adore firefighters"

        yeah, I can see why slashdotters like the guy, the first 5 words alone are enough...

        Fact is _I_ have never seen anything insightful or instructive from his pen, mainly perhaps because I have never seen anything original from his pen, it all appears to be stuff he has read elsewhere (same places as me perhaps) and then reworded and revamped himself... this

        • Fact is green's articles on linux security are IMHO a joke, I have been asked the same question, any MY answer was thus.

          "Get yourself a laptop, cpu not too important but make sure it has at least 512 meg of ram, pull the hard disk and sell it on ebay, now get yourself a couple of usb flash disks, make sure everything written to them is STRONGLY encrypted, now stick a 802 card in the pcmcia slot, now stick a knoppix live-cd in, now go somewhere where there is "war" type access and only then boot it up and d
  • It's like a Service Patch for wetware!
  • by veg_all ( 22581 ) on Wednesday August 11, 2004 @03:05PM (#9942459)
    The first couple of paragraphs consist of an intro and a
    description of the preface.

    The third paragraph describes the first chapter.

    The fourth paragraph describes the second chapter.

    The fifth paragraph describes the third chapter.

    The sixth paragraph describes the fourth chapter.

    The seventh paragraph describes the fifth chapter.

    The eight paragraph describes the sixth chapter.

    The ninth paragraph describes the seventh chapter.

    The tenth paragraph notes there are indexes.

    Overall this review is skeletal at best.

    I give it a 3 out of 10.

    Overall, this review is useful for nearly some people, not so useful for others. It's
    certainly written in English, so more than half of Slashdot's
    readership will feel a vague sense of familiarity.
  • Impact (Score:3, Insightful)

    by maximilln ( 654768 ) on Wednesday August 11, 2004 @03:36PM (#9942726) Homepage Journal
    I don't think that it's a problem to demonstrate the advantages of security. Everyone knows the advantages of security. The difficulty is demonstrating impact. The vast majority of people, since they don't understand computers, feel that the basic knowledge of how to crack security is enough of a deterrant and lock in and of itself. The general need for additional security measures is perceived to be paranoia.

    Unless there's a widespread and media popularized outbreak of identity theft, or computer hijacking, or people who can't check their e-mail or browse the web, then computer security will continue to be perceived as a topic of paranoia.

    Currently the impact of computer insecurity is considered to be an annoyance. Extrapolated damages of corporate insecurity are given the same regard as the extrapolated damages of trading mp3s. Until authorities take a tough stance on abusive network activities (spam, browser hijacking, unwanted pop-up advertising, unauthorized collection of consumer data) then the general populance will continue to accept a loose attitude towards computer security.

    The fact is that insecurity is profitable as a business. There's no real motivation to protect the consumers so why should the consumers waste effort protecting themselves?
  • Network monitoring (Score:3, Insightful)

    by flakac ( 307921 ) on Wednesday August 11, 2004 @03:45PM (#9942795)
    Chapter Four is about using common tools, like Ethereal, Netstat...

    If you're talking about Joe User, you need to stick to what works under Windows. Last time I checked, Ethereal on win32 platforms only worked on LAN (eth) adapters and not dialup connections. If you've got a cable modem or DSL hooked up via an ethernet adapter, then it's a viable option. I'll agree about netstat, but I really don't think I'd be able to teach my a non-technical person how to interperet the output -- even given a book with examples, a non-techie really doesn't stand much chance tracing down what programs have what ports open.

    As far as monitoring open connections on a win32 box, I'd heartily recommend TCPView [sysinternals.com]. It's capable of printing out information on all connections, their states and what processes they're associated with. Very powerful tool, and I can talk my mom through using it over the phone, even sending my the results via email.

No spitting on the Bus! Thank you, The Mgt.

Working...