- Shopping Bag ( 0 items )
Posted April 22, 2004
The whole concept of this book is: know your enemy. If you are a software developer or systems administrator, something you touch is bound to be attacked. Software developers need to understand this when writing programs. Likewise, systems administrators must protect their system from outside attack. This book proceeds from the premise that attack is inevitable, but we are more effective in dealing with it if we know the tactics of hackers. As we understand how they think and act, it helps us write and maintain a higher level of security within applications or network infrastructure. This book is very interesting to read and amazing to see how easy it is to ¿hack¿ various kinds of applications with just a few tools. The book discusses the basics of reverse engineering on Windows, Linux, and Pocket PC. Additionally, the authors step through a couple of examples, to show just how easy it is to bypass entering a serial number in a software install. Other ¿hacks¿ shows include buffer overflow, TCP/IP, SQL injection attacks, and even social engineering. I would recommend this book to anyone interested in any kind of software or network security. It is very eye-opening to see just how easy it is to compromise a system. Once you know how your enemy attacks, you can proceed with ways to combat them.
1 out of 1 people found this review helpful.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted February 18, 2004
Different Approach to Computer Security
This book shows a different perspective on computer security, the perspective of the cracker trying to attack or invade your computer system or network. And why not? The best offense sometimes is a good defense. Among the topics this book talks about? It describes how you can 'reverse engineer' your own programs (In Windows 9X, XP, etc. UNIX and Linux) and also shows in some cases how easy it is for hackers and crackers to invade your computers and networks. And speaking of UNIX, this book also how easily UNIX boxes can be compromised, or how easily Windows machines can be (which given the recent news about another XP security hole, seems almost redundant for the book's authors to mention). It shows that even Linux can be quite insecure, proving that no OS is completely safe just that it may be safer than Unix or Windows. Just on these points alone, the book is an eye-opener. The chapters about 'reverse engineering' also made me think about how handheld devices like Palm Pilots can also be attacked and/or infected with virii or worms, once they are connected to the Internet. No computer device is truly immune. Among other chapters with good information? Ones about social engineering, attacks on various platforms (Unix, Windows Client & Windows Server, SQL and Wireless) and methods of defense against them. This book has a ton of outstanding information that may scare the heck out of security professionals, but is designed truly to inform. It offers security professionals new ways of defending against attacks and viruses.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.