|
Part I: Mac Security Basics |
|
|
1 | (256) |
|
|
|
3 | (24) |
|
Mac Security: Myth versus Fact |
|
|
3 | (4) |
|
Is it true that Macs don't get viruses? |
|
|
4 | (1) |
|
Can Macs spread viruses to Windows computers? |
|
|
5 | (1) |
|
Is web browsing safe on a Mac? |
|
|
5 | (1) |
|
Can someone eavesdrop on my network if I use a Mac? |
|
|
6 | (1) |
|
Are Mac servers more secure than Windows servers? |
|
|
6 | (1) |
|
What's the biggest threat to Mac security? |
|
|
7 | (1) |
|
Major Mac OS X Security Features |
|
|
7 | (3) |
|
Open-source infrastructure |
|
|
8 | (1) |
|
|
|
8 | (1) |
|
|
|
8 | (1) |
|
|
|
8 | (1) |
|
|
|
8 | (1) |
|
|
|
9 | (1) |
|
|
|
9 | (1) |
|
Firmware password protection |
|
|
9 | (1) |
|
|
|
9 | (1) |
|
|
|
9 | (1) |
|
|
|
10 | (1) |
|
Weighing Convenience against Security |
|
|
11 | (3) |
|
|
|
14 | (1) |
|
The Theory and Practice of Best Practices |
|
|
15 | (1) |
|
Seven Things You Should Do Right Now |
|
|
16 | (10) |
|
|
|
16 | (1) |
|
Set up a standard user account |
|
|
17 | (2) |
|
Change your keychain password |
|
|
19 | (1) |
|
Turn off all unneeded sharing features |
|
|
20 | (2) |
|
|
|
22 | (1) |
|
Switch from WEP or nothing to WPA |
|
|
23 | (2) |
|
|
|
25 | (1) |
|
|
|
26 | (1) |
|
Securing Your Mac against Theft |
|
|
27 | (22) |
|
Security Cables and Locks |
|
|
27 | (2) |
|
|
|
29 | (1) |
|
|
|
29 | (3) |
|
|
|
29 | (1) |
|
|
|
29 | (1) |
|
|
|
30 | (2) |
|
Marking a Mac for Recovery |
|
|
32 | (1) |
|
|
|
32 | (1) |
|
|
|
33 | (1) |
|
Tracking and Recovering Stolen Macs |
|
|
33 | (15) |
|
Using tracking software and services |
|
|
34 | (4) |
|
Using command-line software to track a Mac |
|
|
38 | (5) |
|
Tracking a Mac with Back to My Mac |
|
|
43 | (5) |
|
|
|
48 | (1) |
|
Working with User Accounts |
|
|
49 | (44) |
|
How Accounts Affect Security |
|
|
49 | (3) |
|
|
|
49 | (1) |
|
What a Mac OS X account is |
|
|
50 | (1) |
|
|
|
51 | (1) |
|
The principle of least privilege |
|
|
51 | (1) |
|
Understanding POSIX Permissions |
|
|
52 | (10) |
|
|
|
52 | (1) |
|
|
|
53 | (1) |
|
|
|
53 | (1) |
|
|
|
54 | (1) |
|
Modifying file permissions |
|
|
55 | (1) |
|
|
|
56 | (1) |
|
Using the Get Info window |
|
|
56 | (2) |
|
|
|
58 | (3) |
|
The other permission bits |
|
|
61 | (1) |
|
|
|
62 | (7) |
|
|
|
62 | (2) |
|
|
|
64 | (1) |
|
Managed accounts with parental controls |
|
|
64 | (1) |
|
|
|
65 | (1) |
|
|
|
66 | (1) |
|
|
|
67 | (1) |
|
|
|
68 | (1) |
|
|
|
68 | (1) |
|
|
|
69 | (6) |
|
|
|
69 | (2) |
|
|
|
71 | (2) |
|
|
|
73 | (2) |
|
|
|
75 | (2) |
|
|
|
77 | (6) |
|
|
|
83 | (4) |
|
|
|
84 | (1) |
|
|
|
84 | (1) |
|
Sudo limitations and risks |
|
|
85 | (1) |
|
Modifying the sudoers file |
|
|
86 | (1) |
|
Using Access Control Lists |
|
|
87 | (4) |
|
What's an access control list? |
|
|
87 | (1) |
|
Configuring access control lists |
|
|
87 | (1) |
|
Access control list options |
|
|
88 | (3) |
|
|
|
91 | (2) |
|
Configuring Basic Security Settings |
|
|
93 | (34) |
|
|
|
93 | (9) |
|
Requiring a password to wake a computer |
|
|
93 | (2) |
|
Disabling automatic login |
|
|
95 | (1) |
|
Locking System Preferences |
|
|
96 | (2) |
|
|
|
98 | (1) |
|
|
|
99 | (1) |
|
Location Services settings |
|
|
100 | (1) |
|
Infrared receiver settings |
|
|
100 | (2) |
|
|
|
102 | (3) |
|
|
|
102 | (1) |
|
|
|
103 | (2) |
|
|
|
105 | (3) |
|
|
|
108 | (6) |
|
|
|
109 | (1) |
|
|
|
110 | (1) |
|
|
|
111 | (1) |
|
|
|
112 | (2) |
|
|
|
114 | (4) |
|
Setting computer, display, and disk sleep |
|
|
115 | (1) |
|
Waking for network access |
|
|
116 | (2) |
|
|
|
118 | (1) |
|
|
|
119 | (2) |
|
|
|
121 | (1) |
|
|
|
122 | (3) |
|
|
|
125 | (1) |
|
|
|
125 | (2) |
|
|
|
127 | (26) |
|
|
|
127 | (3) |
|
|
|
130 | (1) |
|
|
|
130 | (1) |
|
Public keys, private keys, and certificates |
|
|
130 | (1) |
|
|
|
131 | (1) |
|
Understanding Keychain Alerts |
|
|
131 | (3) |
|
Request to use your keychain |
|
|
132 | (1) |
|
Permission to use an existing item |
|
|
132 | (1) |
|
Alert that an application has changed |
|
|
133 | (1) |
|
|
|
134 | (3) |
|
|
|
137 | (15) |
|
|
|
137 | (2) |
|
|
|
139 | (2) |
|
|
|
141 | (3) |
|
|
|
144 | (1) |
|
Working with certificates |
|
|
145 | (4) |
|
Repairing damaged keychains |
|
|
149 | (2) |
|
|
|
151 | (1) |
|
|
|
152 | (1) |
|
|
|
153 | (30) |
|
|
|
153 | (8) |
|
What makes a password secure? |
|
|
154 | (1) |
|
Exploring password threats |
|
|
155 | (3) |
|
Identification versus security |
|
|
158 | (1) |
|
Multifactor authentication |
|
|
159 | (1) |
|
|
|
160 | (1) |
|
The Varieties of Mac OS X Passwords |
|
|
161 | (4) |
|
|
|
161 | (1) |
|
FileVault master password |
|
|
162 | (1) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
164 | (1) |
|
|
|
165 | (1) |
|
|
|
165 | (1) |
|
|
|
165 | (5) |
|
Avoiding easily guessed passwords |
|
|
166 | (1) |
|
Password length and complexity |
|
|
166 | (1) |
|
|
|
167 | (1) |
|
|
|
168 | (1) |
|
|
|
169 | (1) |
|
|
|
170 | (2) |
|
Using Third-Party Password Utilities |
|
|
172 | (4) |
|
|
|
172 | (1) |
|
|
|
173 | (3) |
|
Resetting an Administrator's Password |
|
|
176 | (1) |
|
Using the original administrator account |
|
|
176 | (1) |
|
Using a Mac OS X Install DVD |
|
|
176 | (1) |
|
Using a Firmware Password |
|
|
177 | (3) |
|
Using Smart Cards, Tokens, and Biometric Authentication Devices |
|
|
180 | (1) |
|
|
|
180 | (1) |
|
|
|
181 | (1) |
|
|
|
181 | (1) |
|
|
|
181 | (2) |
|
Securely Sharing System Resources |
|
|
183 | (38) |
|
Using Shared System Resources Wisely |
|
|
183 | (1) |
|
|
|
184 | (2) |
|
|
|
186 | (2) |
|
|
|
188 | (5) |
|
|
|
188 | (2) |
|
Choosing file-sharing protocols |
|
|
190 | (1) |
|
Changing which items are shared |
|
|
191 | (1) |
|
Granting access to users and groups |
|
|
192 | (1) |
|
|
|
193 | (2) |
|
|
|
195 | (3) |
|
|
|
198 | (3) |
|
|
|
198 | (1) |
|
|
|
198 | (1) |
|
Making your web server visible to the outside world |
|
|
199 | (2) |
|
|
|
201 | (1) |
|
|
|
201 | (2) |
|
|
|
203 | (3) |
|
|
|
206 | (2) |
|
|
|
208 | (2) |
|
|
|
210 | (3) |
|
|
|
213 | (6) |
|
Sharing files via Bluetooth |
|
|
214 | (1) |
|
Setting up Bluetooth Sharing |
|
|
215 | (3) |
|
Sharing an Internet connection via Bluetooth |
|
|
218 | (1) |
|
|
|
219 | (2) |
|
|
|
221 | (36) |
|
|
|
221 | (4) |
|
|
|
222 | (1) |
|
|
|
223 | (1) |
|
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
|
|
225 | (4) |
|
How many computers are you backing up? |
|
|
226 | (1) |
|
What type(s) of backup do you need? |
|
|
227 | (1) |
|
|
|
227 | (1) |
|
How should data be restored? |
|
|
227 | (1) |
|
What other special features do you need? |
|
|
228 | (1) |
|
Bottom-line recommendations |
|
|
229 | (1) |
|
|
|
229 | (9) |
|
|
|
230 | (1) |
|
Choosing hardware for Time Machine |
|
|
231 | (1) |
|
|
|
232 | (2) |
|
Managing Time Machine behavior |
|
|
234 | (1) |
|
Restoring data from Time Machine |
|
|
235 | (3) |
|
Creating Bootable Duplicates |
|
|
238 | (9) |
|
What's a bootable duplicate? |
|
|
238 | (1) |
|
|
|
239 | (3) |
|
|
|
242 | (3) |
|
|
|
245 | (1) |
|
Starting up from a bootable duplicate |
|
|
246 | (1) |
|
Using Internet Backup Services |
|
|
247 | (3) |
|
|
|
247 | (1) |
|
|
|
248 | (2) |
|
|
|
250 | (1) |
|
|
|
250 | (1) |
|
Keeping media comfortable |
|
|
251 | (1) |
|
Testing and recopying media |
|
|
251 | (1) |
|
|
|
251 | (5) |
|
Mirrored RAIDs and backup |
|
|
252 | (1) |
|
|
|
252 | (1) |
|
|
|
253 | (1) |
|
Configuring a RAID with Disk Utility |
|
|
254 | (2) |
|
|
|
256 | (1) |
|
Part II: Protecting Your Privacy |
|
|
257 | (204) |
|
Securing Email, Chat, and Voice over IP |
|
|
259 | (56) |
|
Understanding Email Security |
|
|
259 | (4) |
|
Using secure authentication |
|
|
261 | (1) |
|
Using SSL for sending and receiving email |
|
|
262 | (1) |
|
|
|
262 | (1) |
|
Encrypting email messages |
|
|
263 | (1) |
|
Encrypting data on your disk |
|
|
263 | (1) |
|
|
|
263 | (3) |
|
|
|
264 | (1) |
|
Secure logins in Entourage |
|
|
265 | (1) |
|
Secure logins in Thunderbird |
|
|
266 | (1) |
|
Using SSL for Incoming and Outgoing Mail |
|
|
266 | (8) |
|
|
|
267 | (1) |
|
Configuring SSL for incoming mail |
|
|
267 | (4) |
|
Configuring SSL for outgoing mail |
|
|
271 | (3) |
|
|
|
274 | (2) |
|
|
|
275 | (1) |
|
|
|
275 | (1) |
|
|
|
275 | (1) |
|
|
|
275 | (1) |
|
Digitally Signing and Encrypting Email |
|
|
276 | (14) |
|
When and why to encrypt your email |
|
|
277 | (1) |
|
Using S/MIME in Apple Mail |
|
|
278 | (8) |
|
Using PGP or GPG for encrypted email |
|
|
286 | (4) |
|
|
|
290 | (13) |
|
|
|
290 | (2) |
|
Learning basic spam-filtering concepts |
|
|
292 | (3) |
|
Configuring your email client's spam filter |
|
|
295 | (6) |
|
Using third-party spam filters |
|
|
301 | (1) |
|
Other spam-filtering strategies |
|
|
302 | (1) |
|
Examining Message Headers and Source |
|
|
303 | (5) |
|
|
|
304 | (3) |
|
|
|
307 | (1) |
|
|
|
308 | (3) |
|
Adjusting iChat privacy settings |
|
|
308 | (2) |
|
Using encryption for iChat |
|
|
310 | (1) |
|
Securing Instant Messaging and Voice over IP with Third-Party Software |
|
|
311 | (2) |
|
|
|
312 | (1) |
|
|
|
312 | (1) |
|
|
|
313 | (1) |
|
|
|
313 | (1) |
|
|
|
313 | (2) |
|
Browsing the Web Securely |
|
|
315 | (64) |
|
The Challenges of Secure Browsing |
|
|
316 | (4) |
|
|
|
316 | (1) |
|
|
|
317 | (1) |
|
|
|
318 | (1) |
|
|
|
318 | (1) |
|
|
|
319 | (1) |
|
|
|
320 | (5) |
|
|
|
322 | (1) |
|
Responding to certificate warnings |
|
|
322 | (3) |
|
Keeping Form Information Safe |
|
|
325 | (9) |
|
Using your browser's form-filling feature |
|
|
326 | (5) |
|
Third-party web form password tools |
|
|
331 | (3) |
|
Protecting Yourself from Harmful Downloads |
|
|
334 | (4) |
|
Protecting Yourself from Phishing Schemes |
|
|
338 | (2) |
|
|
|
338 | (1) |
|
Using Extended Validation certificates |
|
|
339 | (1) |
|
Using a password manager to fill in data |
|
|
340 | (1) |
|
Using third-party anti-phishing software |
|
|
340 | (1) |
|
Covering Your Browsing Tracks |
|
|
340 | (23) |
|
The browsing records your Mac stores |
|
|
341 | (1) |
|
Prevention versus cleanup |
|
|
342 | (1) |
|
|
|
343 | (8) |
|
Using Safari's Private Browsing feature |
|
|
351 | (1) |
|
Using Safari's data removal features |
|
|
352 | (2) |
|
Handling private data with Firefox |
|
|
354 | (2) |
|
Using third-party web privacy software |
|
|
356 | (4) |
|
Cleaning up other browsing traces |
|
|
360 | (3) |
|
|
|
363 | (8) |
|
What information you normally reveal |
|
|
364 | (1) |
|
Hiding your IP address by using anonymous proxy servers |
|
|
365 | (4) |
|
Hiding your IP address by using onion routing |
|
|
369 | (1) |
|
Masking other browser details |
|
|
370 | (1) |
|
Blocking Ads, Pop-up Windows, and Flash |
|
|
371 | (6) |
|
|
|
372 | (2) |
|
|
|
374 | (1) |
|
Using other ad-blocking software |
|
|
375 | (2) |
|
Blocking Other Undesirable Content |
|
|
377 | (1) |
|
|
|
378 | (1) |
|
Securely Accessing Other Computers |
|
|
379 | (30) |
|
|
|
379 | (8) |
|
|
|
380 | (1) |
|
|
|
381 | (1) |
|
|
|
382 | (1) |
|
Remote file transfers in the Finder |
|
|
382 | (2) |
|
Using file-transfer software |
|
|
384 | (3) |
|
Controlling Another Computer Remotely |
|
|
387 | (10) |
|
Using Mac OS X Screen Sharing |
|
|
388 | (6) |
|
Using Apple Remote Desktop |
|
|
394 | (1) |
|
|
|
394 | (2) |
|
|
|
396 | (1) |
|
Using SSH for Remote Login |
|
|
397 | (10) |
|
Using SSH with password authentication |
|
|
398 | (2) |
|
Using key-based authentication |
|
|
400 | (2) |
|
Tunneling other services through SSH |
|
|
402 | (5) |
|
|
|
407 | (2) |
|
Using Virtual Private Networks |
|
|
409 | (14) |
|
What Is a Virtual Private Network? |
|
|
409 | (2) |
|
|
|
411 | (3) |
|
|
|
411 | (1) |
|
|
|
412 | (1) |
|
|
|
412 | (1) |
|
|
|
412 | (1) |
|
|
|
413 | (1) |
|
|
|
414 | (2) |
|
Configuring Your Mac for VPN Access |
|
|
416 | (6) |
|
Using the Network preference pane |
|
|
416 | (3) |
|
|
|
419 | (3) |
|
|
|
422 | (1) |
|
Encrypting and Securely Deleting Files |
|
|
423 | (38) |
|
|
|
424 | (5) |
|
|
|
424 | (1) |
|
|
|
425 | (1) |
|
|
|
426 | (1) |
|
Encryption pitfalls and misunderstandings |
|
|
427 | (2) |
|
Encrypting Individual Files and Folders |
|
|
429 | (4) |
|
Encrypting files on the command line |
|
|
430 | (1) |
|
Encrypting files and folders with third-party software |
|
|
430 | (3) |
|
Working with Encrypted Disk Images |
|
|
433 | (9) |
|
Encrypting disk images with Disk Utility |
|
|
434 | (3) |
|
Encrypting disk images with PGP |
|
|
437 | (4) |
|
Using other encrypted disk image products |
|
|
441 | (1) |
|
|
|
442 | (5) |
|
FileVault virtues and vices |
|
|
442 | (2) |
|
Deciding whether FileVault is for you |
|
|
444 | (1) |
|
|
|
445 | (2) |
|
Encrypting an Entire Disk |
|
|
447 | (5) |
|
PGP Whole Disk Encryption |
|
|
448 | (1) |
|
Check Point Full Disk Encryption |
|
|
449 | (1) |
|
|
|
450 | (2) |
|
Using Hardware-Encrypted Drives |
|
|
452 | (3) |
|
|
|
453 | (1) |
|
|
|
453 | (1) |
|
|
|
454 | (1) |
|
Externally authenticating enclosures |
|
|
454 | (1) |
|
Self-encrypting drive mechanisms |
|
|
454 | (1) |
|
|
|
455 | (2) |
|
Using the Secure Empty Trash command |
|
|
456 | (1) |
|
Erasing empty space with Disk Utility |
|
|
456 | (1) |
|
Using third-party utilities |
|
|
457 | (1) |
|
|
|
457 | (2) |
|
|
|
459 | (1) |
|
|
|
460 | (1) |
|
Part III: Network Security Fundamentals |
|
|
461 | (154) |
|
|
|
463 | (32) |
|
|
|
464 | (3) |
|
|
|
464 | (1) |
|
|
|
464 | (1) |
|
|
|
465 | (1) |
|
|
|
465 | (1) |
|
|
|
466 | (1) |
|
|
|
466 | (1) |
|
|
|
466 | (1) |
|
|
|
466 | (1) |
|
|
|
467 | (1) |
|
|
|
467 | (2) |
|
Assessing Your Mac's Vulnerability |
|
|
469 | (1) |
|
Common-Sense Malware Protection |
|
|
469 | (2) |
|
Choosing Anti-Malware Software |
|
|
471 | (11) |
|
|
|
472 | (1) |
|
|
|
472 | (1) |
|
Intego VirusBarrier, Internet Security Barrier, and NetBarrier |
|
|
473 | (2) |
|
|
|
475 | (1) |
|
|
|
476 | (1) |
|
Kaspersky Anti-Virus for Mac |
|
|
477 | (1) |
|
|
|
477 | (1) |
|
|
|
478 | (1) |
|
|
|
479 | (2) |
|
|
|
481 | (1) |
|
Trend Micro Smart Surfing for Mac |
|
|
481 | (1) |
|
|
|
482 | (5) |
|
|
|
483 | (1) |
|
|
|
484 | (1) |
|
|
|
485 | (2) |
|
|
|
487 | (1) |
|
What Anti-Malware Software Can't Do |
|
|
487 | (1) |
|
Securing Windows on a Mac |
|
|
488 | (5) |
|
Security risks with Boot Camp and virtualization software |
|
|
488 | (1) |
|
Protecting your Windows installation |
|
|
489 | (3) |
|
Choosing anti-malware software for Windows |
|
|
492 | (1) |
|
|
|
493 | (2) |
|
Securing Your Wired Network |
|
|
495 | (18) |
|
Understanding Gateways, Modems, and Routers |
|
|
496 | (3) |
|
|
|
496 | (1) |
|
|
|
496 | (1) |
|
Hubs, switches, and routers |
|
|
497 | (1) |
|
|
|
498 | (1) |
|
Understanding NAT, DHCP, and IPv6 |
|
|
499 | (4) |
|
|
|
499 | (2) |
|
|
|
501 | (1) |
|
|
|
502 | (1) |
|
|
|
503 | (2) |
|
|
|
505 | (1) |
|
|
|
505 | (1) |
|
|
|
506 | (1) |
|
|
|
506 | (1) |
|
|
|
507 | (2) |
|
|
|
509 | (3) |
|
The authentication server |
|
|
510 | (1) |
|
|
|
510 | (1) |
|
|
|
510 | (2) |
|
|
|
512 | (1) |
|
Securing Your Wireless Network |
|
|
513 | (36) |
|
|
|
514 | (5) |
|
Protecting your access point |
|
|
514 | (1) |
|
Controlling wireless network visibility |
|
|
514 | (1) |
|
Controlling wireless network access |
|
|
515 | (1) |
|
Encrypting your wireless connection |
|
|
516 | (3) |
|
Configuring an AirPort Base Station |
|
|
519 | (20) |
|
Setting the base station security options |
|
|
520 | (2) |
|
|
|
522 | (17) |
|
Setting up a guest network |
|
|
539 | (1) |
|
Configuring Third-Party Access Points |
|
|
539 | (2) |
|
Access point configuration basics |
|
|
540 | (1) |
|
|
|
540 | (1) |
|
|
|
540 | (1) |
|
|
|
540 | (1) |
|
|
|
541 | (1) |
|
|
|
541 | (1) |
|
Wireless Security Settings on Your Mac |
|
|
541 | (2) |
|
Using Public Wi-Fi Hotspots |
|
|
543 | (2) |
|
Using Wi-Fi Scanning Software |
|
|
545 | (2) |
|
|
|
547 | (2) |
|
|
|
549 | (28) |
|
Understanding How Firewalls Work |
|
|
549 | (3) |
|
|
|
550 | (1) |
|
|
|
550 | (1) |
|
|
|
551 | (1) |
|
|
|
551 | (1) |
|
Using Mac OS X's Application Firewall |
|
|
552 | (5) |
|
How the application firewall works |
|
|
553 | (1) |
|
When to use the application firewall |
|
|
554 | (1) |
|
Configuring the application firewall |
|
|
554 | (3) |
|
|
|
557 | (13) |
|
|
|
558 | (1) |
|
|
|
558 | (2) |
|
|
|
560 | (1) |
|
Creating an IPFW shell script |
|
|
561 | (1) |
|
Creating an IPFW launchd item |
|
|
562 | (1) |
|
Configuring IPFW rules with third-party utilities |
|
|
563 | (7) |
|
Using Other Third-Party Firewall Software |
|
|
570 | (5) |
|
|
|
570 | (1) |
|
IPNetSentryX and IPNetRouterX |
|
|
571 | (2) |
|
|
|
573 | (2) |
|
|
|
575 | (2) |
|
|
|
577 | (20) |
|
The Basics of Running a Secure Web Server |
|
|
577 | (8) |
|
|
|
578 | (1) |
|
|
|
578 | (2) |
|
|
|
580 | (1) |
|
Network and routing setup |
|
|
580 | (1) |
|
|
|
581 | (1) |
|
|
|
582 | (2) |
|
|
|
584 | (1) |
|
Using HTTP Authentication |
|
|
585 | (3) |
|
|
|
588 | (4) |
|
Creating a certificate and activating SSL |
|
|
589 | (2) |
|
Redirecting HTTP traffic to HTTPS |
|
|
591 | (1) |
|
Avoiding Injection Attacks |
|
|
592 | (2) |
|
|
|
594 | (1) |
|
|
|
595 | (2) |
|
|
|
597 | (18) |
|
|
|
597 | (3) |
|
What logs can tell you about security |
|
|
598 | (1) |
|
What information is logged? |
|
|
598 | (1) |
|
|
|
599 | (1) |
|
|
|
600 | (1) |
|
Adjusting syslogd Behavior |
|
|
600 | (2) |
|
|
|
602 | (1) |
|
Understanding the Console and System Logs |
|
|
602 | (6) |
|
|
|
603 | (1) |
|
|
|
603 | (3) |
|
|
|
606 | (2) |
|
Looking for Useful Information |
|
|
608 | (6) |
|
|
|
608 | (1) |
|
|
|
609 | (1) |
|
|
|
610 | (1) |
|
|
|
610 | (1) |
|
|
|
611 | (1) |
|
|
|
611 | (1) |
|
|
|
612 | (1) |
|
|
|
613 | (1) |
|
|
|
614 | (1) |
|
Part IV: Advanced Security Measures |
|
|
615 | (110) |
|
|
|
617 | (18) |
|
What Can Network Scanning Reveal? |
|
|
618 | (1) |
|
|
|
619 | (5) |
|
Using nmap for network mapping |
|
|
620 | (3) |
|
Using IPNetMonitorX for network mapping |
|
|
623 | (1) |
|
|
|
624 | (8) |
|
Using Network Utility for port scanning |
|
|
625 | (1) |
|
Using nmap for port scanning |
|
|
626 | (5) |
|
Using IPNetMonitorX for port scanning |
|
|
631 | (1) |
|
Protecting Your Macs from Network Scanning |
|
|
632 | (2) |
|
|
|
634 | (1) |
|
Vulnerability Scanning and Testing |
|
|
635 | (30) |
|
|
|
636 | (11) |
|
|
|
636 | (1) |
|
Installing and configuring Nessus |
|
|
636 | (4) |
|
|
|
640 | (1) |
|
Creating a scanning policy |
|
|
641 | (4) |
|
Running a customized scan |
|
|
645 | (1) |
|
Interpreting scan results |
|
|
646 | (1) |
|
Using SAINT and SAINTexploit |
|
|
647 | (6) |
|
|
|
653 | (10) |
|
|
|
654 | (1) |
|
|
|
654 | (2) |
|
Basic Metasploit procedures |
|
|
656 | (1) |
|
Running an exploit in the Metasploit console |
|
|
657 | (1) |
|
Running an exploit in the Metasploit GUI |
|
|
658 | (5) |
|
|
|
663 | (2) |
|
|
|
665 | (26) |
|
The Varieties of Network Monitoring |
|
|
665 | (1) |
|
Network Intrusion Detection Systems |
|
|
666 | (11) |
|
|
|
668 | (8) |
|
Other third-party NIDS tools |
|
|
676 | (1) |
|
Network Intrusion Prevention Systems |
|
|
677 | (8) |
|
|
|
677 | (1) |
|
Using IPNetSentryX or IPNetRouterX as a NIPS |
|
|
678 | (5) |
|
|
|
683 | (2) |
|
Information Leak Detection Systems |
|
|
685 | (3) |
|
|
|
686 | (1) |
|
|
|
686 | (2) |
|
|
|
688 | (2) |
|
|
|
690 | (1) |
|
Monitoring File Integrity |
|
|
691 | (8) |
|
Understanding File Integrity Monitoring |
|
|
691 | (1) |
|
|
|
692 | (3) |
|
Configuring Tripwire's policy |
|
|
693 | (1) |
|
|
|
694 | (1) |
|
|
|
695 | (1) |
|
|
|
695 | (1) |
|
|
|
696 | (1) |
|
|
|
697 | (1) |
|
|
|
698 | (1) |
|
Forensics: Discovering What Went Wrong |
|
|
699 | (26) |
|
Overview of Computer Forensics |
|
|
700 | (3) |
|
Live versus deferred analysis |
|
|
700 | (1) |
|
Choosing whether to save a disk image |
|
|
701 | (1) |
|
|
|
702 | (1) |
|
Looking for Rogue Processes |
|
|
703 | (3) |
|
|
|
703 | (2) |
|
|
|
705 | (1) |
|
Looking for Rogue Software |
|
|
706 | (4) |
|
|
|
710 | (9) |
|
Installing and configuring MacForensicsLab |
|
|
711 | (4) |
|
|
|
715 | (1) |
|
|
|
716 | (2) |
|
|
|
718 | (1) |
|
|
|
719 | (4) |
|
|
|
719 | (2) |
|
|
|
721 | (1) |
|
|
|
722 | (1) |
|
|
|
723 | (1) |
|
|
|
723 | (1) |
|
|
|
723 | (2) |
|
Part V: Securing Mac OS X Server |
|
|
725 | (128) |
|
Mac OS X Server Security Overview |
|
|
727 | (16) |
|
Comparing Mac OS X and Mac OS X Server |
|
|
727 | (4) |
|
Mac OS X Server Security Fundamentals |
|
|
731 | (1) |
|
Understanding Open Directory |
|
|
732 | (2) |
|
Understanding Password Server and Kerberos |
|
|
734 | (2) |
|
Choosing Which Services to Run |
|
|
736 | (3) |
|
Configuring Local User Accounts |
|
|
739 | (3) |
|
|
|
742 | (1) |
|
|
|
743 | (22) |
|
Configuring Open Directory |
|
|
743 | (19) |
|
Activating Open Directory |
|
|
744 | (1) |
|
Choosing an Open Directory role |
|
|
745 | (3) |
|
|
|
748 | (1) |
|
|
|
749 | (4) |
|
Configuring Open Directory users and groups |
|
|
753 | (7) |
|
Setting up Open Directory clients |
|
|
760 | (2) |
|
Using Windows Directory Services |
|
|
762 | (2) |
|
Using Active Directory for directory services |
|
|
763 | (1) |
|
Setting up a magic triangle |
|
|
764 | (1) |
|
|
|
764 | (1) |
|
Working with SSL Certificates |
|
|
765 | (12) |
|
|
|
766 | (2) |
|
|
|
766 | (1) |
|
|
|
767 | (1) |
|
Creating a Self-Signed Certificate |
|
|
768 | (2) |
|
Requesting a Certificate from a Certificate Authority |
|
|
770 | (2) |
|
Creating and Using a Certificate Authority |
|
|
772 | (2) |
|
|
|
774 | (1) |
|
|
|
775 | (2) |
|
|
|
777 | (14) |
|
Mac OS X Mail Server Overview |
|
|
777 | (2) |
|
Configuring Authentication Options |
|
|
779 | (2) |
|
|
|
781 | (1) |
|
Configuring Relay Options |
|
|
782 | (2) |
|
Configuring Spam and Virus Protection |
|
|
784 | (3) |
|
Turning On the Mail Service |
|
|
787 | (3) |
|
|
|
790 | (1) |
|
|
|
791 | (20) |
|
About File-Sharing Protocols |
|
|
791 | (2) |
|
|
|
792 | (1) |
|
|
|
792 | (1) |
|
|
|
793 | (1) |
|
|
|
793 | (1) |
|
|
|
793 | (2) |
|
|
|
795 | (2) |
|
|
|
797 | (1) |
|
|
|
798 | (1) |
|
Configuring a Share Point |
|
|
799 | (10) |
|
|
|
800 | (1) |
|
|
|
800 | (4) |
|
Restricting access to a share point |
|
|
804 | (3) |
|
Restricting access to file-sharing services |
|
|
807 | (2) |
|
|
|
809 | (2) |
|
|
|
811 | (14) |
|
|
|
811 | (3) |
|
|
|
814 | (2) |
|
Controlling Site Access with Realms |
|
|
816 | (3) |
|
|
|
819 | (3) |
|
Configuring the Forward Proxy Server |
|
|
822 | (1) |
|
|
|
823 | (2) |
|
Securing Other Network Services |
|
|
825 | (28) |
|
Configuring the Mac OS X Server Firewall |
|
|
825 | (8) |
|
|
|
826 | (1) |
|
Configuring standard services |
|
|
827 | (1) |
|
|
|
828 | (3) |
|
|
|
831 | (2) |
|
Using Mac OS X Server's VPN Services |
|
|
833 | (4) |
|
Choosing a transport protocol |
|
|
833 | (1) |
|
Configuring L2TP over IPsec |
|
|
833 | (2) |
|
|
|
835 | (1) |
|
|
|
836 | (1) |
|
Securing Address Book Server |
|
|
837 | (2) |
|
|
|
839 | (2) |
|
|
|
841 | (2) |
|
Securing the Mobile Access Server |
|
|
843 | (4) |
|
|
|
847 | (2) |
|
|
|
849 | (1) |
|
|
|
850 | (2) |
|
|
|
852 | (1) |
|
|
|
853 | (8) |
|
Appendix: Where to Find More Information |
|
|
861 | (4) |
|
|
|
861 | (1) |
|
|
|
862 | (1) |
|
|
|
863 | (1) |
|
|
|
863 | (2) |
| Index |
|
865 | |