Network Security Hacks and over one million other books are available for Amazon Kindle. Learn more
Buy Used
Condition: :
Comment: Used, but looks brand new. Only very slight signs of use. Cover and binding are undamaged, and pages are crisp and unmarked. Unbeatable customer service, and we usually ship the same or next day. Over one million satisfied customers!
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Network Security Hacks Paperback – April 1, 2004

See all 4 formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"
Paperback, April 1, 2004
$0.80 $0.01

There is a newer edition of this item:

Spring Books
The Big Books of Spring
See our editors' picks for the books you'll want to read this season, from blockbusters and biographies to new fiction and children's books.

Shop the new
New! Introducing the, a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 304 pages
  • Publisher: O'Reilly Media; 1st edition (April 1, 2004)
  • Language: English
  • ISBN-10: 0596006438
  • ISBN-13: 978-0596006433
  • Product Dimensions: 6 x 0.8 x 9 inches
  • Shipping Weight: 15.2 ounces
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (23 customer reviews)
  • Amazon Best Sellers Rank: #3,437,035 in Books (See Top 100 in Books)

Editorial Reviews

Book Description

Tips & Tools for Protecting Your Privacy --This text refers to an alternate Paperback edition.

About the Author

Andrew Lockhart is originally from South Carolina, but currently resides in northern Colorado where he spends his time trying to learn the black art of auditing disassembled binaries and trying to keep from freezing to death. He holds a BS in computer science from Colorado State University and has done security consulting for small businesses in the area. He currently works at a Fortune 100 company when not writing. In his free time he works on Snort-Wireless, a project intended to add wireless intrusion detection popular OpenSource IDS Snort.

Customer Reviews

The book is very well written in a professional form.
Werner Preining
All in all a good book for a skilled, intermediate level system and network administrator.
If you are doing Linux for fun or work you need will need to buy this book.
Race Vanderdecken

Most Helpful Customer Reviews

24 of 25 people found the following review helpful By Richard Bejtlich on June 30, 2004
Format: Paperback
"Network Security Hacks" (NSH) has something for nearly everyone, although it focuses squarely on Linux, BSD, and Windows, in that order of preference. Administrators for commercial UNIX variants (Solaris, AIX, HP-UX, etc.) should be able to apply much of the book's advice to their environments, but they are not the target audience. NSH is written for admins needing quick-start guides for common security tools, and in this respect it delivers.
I found NSH to be most rewarding when it avoided discussing the same topics everyone else has covered. Lesser known tools like authpf, ftester, sniffdet, SFS, rpcapd, and Sguil caught my interest (especially as I write Sguil installation docs). Even some ways to use familiar tools were helpful, like the -f (fork) and -N (no command) switches for SSH forwarding. In some cases it made sense to mention well-worn topics like BIND or MySQL, with an eye towards quickly augmenting the security of those servers.
Elsewhere I questioned the need to cover certain tools. With the number of Snort titles approaching double digits, and O'Reilly's own Snort books in the wings, was it really necessary to devote several hacks to Snort? In the same respect, I felt mention of Nmap, Nessus, swatch, and ACID was not needed, nor was advice on implementing certain Windows security features.
In some cases the descriptions were too brief to really explain the technologies at hand. For example, the "Secure Tunnels" chapter discusses a very specific IPSec scenario (wireless client to gateway) without informing the reader of the other sorts of tunnels that are possible. I also questioned some of the content, like p. 47's statement that Windows lacks "robust built-in scripting.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
36 of 40 people found the following review helpful By Jack D. Herrington on July 28, 2004
Format: Paperback
It's important to understand who this book is for. It's not for the amateur looking to configure their firewall. The book starts with locking up UNIX filesystems and doesn't turn back the complexity clock as it winds through all the way to advanced topics like Honeypots and various SSH tunneling schemes. I highly recommend this book for network administrators and security professionals looking to make sure they have all of their bases covered. However, for the personal computer user looking to make sure their DSL doesn't get hacked I cannot recommend this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
14 of 15 people found the following review helpful By swallbridge on September 8, 2004
Format: Paperback
This book took me a long time to read, but for a good reason, I kept implementing

the various hacks in the book on a server I had started setting up.

The book is mostly Unix related, but there is some Windows related `hacks' as well.

I think the Windows coverage was lacking a bit though. For Unix, it talks about

Linux, the BSD's and a bit on Mac OS X and Solaris. Most of the topics are

general enough to apply to any Unix based Operating System, but some are specific

to an operating system.

One of the great things about the Hacks series of books by O'Reilly is that the

information is presented in nice small chunks that you can read in a few minutes

if you have some spare time.

The hacks are all `hyperlinked' to each other, if a hack mentions something that

relates to another hack, it is highlighted in blue and the hack that it

references is listed. I did find a few places where this wasn't done

(#84 Real-Time Monitoring, first mentions Barnyard but doesn't provide any

information on it or mention that it is one of the later hacks).

Lots of the hacks in the book could be found by doing some reading on the

internet, but finding such a variety of topics all in one place, with enough

information to get you started is really nice. Even though I consider myself to

be fairly security conscious, I still found quite a few things in this book that

I hadn't thought of, or plain didn't realize were possible or even existed. I

would recommend this book to anyone that is interested in security or anyone

responsible for maintaining a server (whether or not it is on the internet).
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 17 people found the following review helpful By Joaquin Menchaca on July 31, 2004
Format: Paperback
Overall, I find this book to be an enjoyable read. I thumb through it time and time again, and come up with some useful hints and tips (not really necessarily hacks though). It's more oriented toward BSD Unix and Linux, but I did find some useful hints for Windows (the current topic of my studies). I really like the plug for ntsyslod (hack 56), which can take binary event logs and route them to syslogd service. Nice. Finally, logs in Windows are now open for business.

I found some material to be trivial, making problems from non-problems, or rather not practical to implement. For example, one hint advises Windows users to encrypt their temp directory (hack 28). However, there are easy workarounds to bypass EFS, and the temp directory is within a user's profile, and thus secured from other users anyhow. So encrypting it is unecessary, and not useful given users can drag a file to a floppy or non-NTFS filesystem to and bypass the encryption.

One hack recommended flush the page file as some important application data might be in there (hack 29). However, this requires delving into the registry, and to implement across all workstations is too taxing. However, there could be ways to automate this through group policy objects and scripts. There's no coverage on how to automate some of these chores, which is not always straightforward in Windows.

One a final note, I wish there was more coverage of Windows. There's could be equivelent coverage of things like time sychronization (hack 44) for Windows as well.

Overall though, I think there are enough useful tips to make this book valuable. I've already wrote my name on this one...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews

More About the Author

Discover books, learn about writers, read author blogs, and more.

What Other Items Do Customers Buy After Viewing This Item?