IntroductionWeb SecurityWeb Server LockdownManaging Access ControlHandling Directory and Data StructuresDirectory PropertiesEliminating Scripting VulnerabilitiesLogging ActivityPerforming BackupsMaintaining IntegrityFinding Rogue Web ServersStopping Browser ExploitsExploitable Browser CharacteristicsCookiesWeb SpoofingWeb Server ExploitsSSL and HTTP/SSSL and TLSHTTP/STLSS-HTTPInstant MessagingPacket Sniffers and Instant MessagingText Messaging and Short Message Service (SMS)Web-based VulnerabilitiesUnderstanding Java-, JavaScript-, and ActiveX-based ProblemsJavaActiveXDangers Associated with Using ActiveXAvoiding Common ActiveX VulnerabilitiesLessening the Impact of ActiveX VulnerabilitiesProtection at the Network LevelProtection at the Client LevelJavaScriptPreventing Problems with Java, JavaScript, and ActiveXProgramming Secure ScriptsCode Signing: Solution or More Problems?Understanding Code SigningThe Benefits of Code SigningProblems with the Code Signing ProcessBuffer OverflowsMaking Browsers and E-mail Clients More SecureRestricting Programming LanguagesKeep Security Patches CurrentSecuring Web Browser SoftwareSecuring Microsoft IECGIWhat is a CGI Script and What Does It Do?Typical Uses of CGI ScriptsBreak-ins Resulting from Weak CGI ScriptsCGI WrappersNiktoFTP SecurityActive and Passive FTPS/FTPSecure CopyBlind FTP/AnonymousFTP Sharing and VulnerabilitiesPacket Sniffing FTP TransmissionsDirectory Services and LDAP SecurityLDAPLDAP DirectoriesOrganizational UnitsObjects, Attributes and the SchemaSecuring LDAPSummarySolutions Fast TrackWeb SecurityFTP SecurityLDAP SecurityFrequently Asked Questions