Hacking – Firewalls And Networks How To Hack Into Remote Computers (2010). This is a famous book about tutorial how to Gaining Access and Securing the Gateway. This is part II book. There are four chapter in it.
Chapter 6 about IP Spoofing and Sniffing, Sniffing and spoofing are security threats that target the lower layers of the networking infrastructure supporting applications that use the Internet. Users do not interact directly with these lower layers and are typically completely unaware that they exist. Without a deliberate consideration of these threats, it is impossible to build effective security into the higher levels.
Chapter 7 about How to Build a Firewall, Every day, people use insurance to protect their valuables from fire or theft. Businesses protect themselves from intellectual theft through patents and trademarks. Because the use of global networking has increased the information flow and dependence upon our computing technology, Information System Managers have realized the need to protect their computing systems, networks, and information from damage and theft. Although there are several ways this can be achieved, the most prevalent is the use of a firewall.
Chapter 8 about SATAN and the Internet Inferno, We walked together towards the shining light, discussing things that here are best kept silent, as there they were most fitting for discussion.” —Dante Alighieri, Inferno. Some people think that open discussion of network security problems is an invitation to disaster. Claiming “security through obscurity” to be an additional layer of protection, they are content to trust software creators and vendors to protect their systems. The release of the SATAN program in April 1995 created an uproar with this group. A few of them even tried to get the government to halt SATAN’s release.
Chapter 9 about Kerberos, A conventional time-sharing system requires a prospective user to provide an identity, and to authenticate that identity before using its services. A network that connects prospective clients with services has a corresponding need to identify and authenticate its clients. One approach is for the service to trust the authentication performed by the client system. The Unix network applications lpr and rcp, for example, trust the user’s workstation to reliably authenticate its clients.
E-Book ~ Hacking – Firewalls And Networks How To Hack Into Remote Computers