![]() General Safeguards Against Cracking Wireless Networks.Chapter 12: Securing a Wireless Network.Using Mac OS X to Protect Other Computers. ![]() Configuring the Application Layer Firewall from the Command Line.Allowing Signed Software to Receive Incoming Connections.Considerations When Configuring Peer-to-Peer Networks.Interfacing with Disk Images from the Command Line.Using Disk Images as Encrypted Data Stores.Using the Keychain to Secure Sensitive Data.Chapter 9: Encrypting Files and Volumes.Chapter 8: Malware Security: Combating Viruses, Worms, and Root Kits.Chapter 7: Securing Web Browsers and E-mail.Gatekeeper: Signature Enforcement in OS X.Chapter 6: Application Signing and Sandbox.Audit Trail Configurations for High Security Environments.BSM – Auditing with the Basic Security Module.Chapter 5: Reviewing Logs and Monitoring.Using mtree to Audit File System Permissions.Using chown and chmod to Manage Permissions. ![]() Mac File Permissions: A Brief History of Time.SUID Applications: Getting into the Nitty-Gritty.Restricting Access with the Command Line: sudoers.Advanced Settings in System Preferences.Introducing Identification, Authentication, and Authorization.Validating the Authenticity of Applications and Services.Stopping Services, Daemons, and Processes.Introduction to Services, Daemons, and Processes. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |