Introduction54. Strip the KernelCustomizing Your KernelCPU optionsSystem-specific optionsSupported buses and media devicesPeripheral support and power managementInterface supportUSB supportBuilding the New KernelKeeping Track of Your OptionsInstalling the New KernelSee Also55. FreeBSD Access Control ListsEnabling ACLsAdditional UFS1 ConfigurationViewing ACLsAdding and Subtracting ACLsUsing ACLs with Samba and WindowsSetting Default ACLsSee Also56. Protect Files with FlagsPreventing File ChangesWatch Your DirectoriesPreventing Some Changes and Allowing OthersLog ProtectionProtecting BinariesControlling BackupsSee Also57. Tighten Security with Mandatory Access ControlPreparing the SystemSeeing Other UsersQuickly Disable All InterfacesSee Also58. Use mtree as a Built-in TripwireCreating the Integrity DatabasePreparing the Database for StorageUsing the Integrity DatabaseDeciding on Which Files to IncludeSee Also59. Intrusion Detection with Snort, ACID, MySQL, and FreeBSDInstalling the SoftwareInstall PHP4, Apache, and MySQLInstall MySQL-serverMore installationsConfiguringConfigure Apache and PHPConfigure PHPConfigure MySQLConfigure SnortConfigure ACIDRunning ACIDRunning SnortHacking the HackSee Also60. Encrypt Your Hard DiskThe Cryptographic Disk DevicePreparing the DiskScrubbing the DiskCreating the Encrypted Disk DeviceModifying Configuration FilesRestoring DataHacking the HackFinal Thoughts and WarningsSee Also61. Sudo GotchasLimitations of sudosudo Configuration GotchasShell Access with sudoSee Also62. sudoscriptsudoscript OverviewIs sudoscript Secure?Using sudoscriptThe sudoscript Log FileSee Also63. Restrict an SSH serverInstalling scponlyTesting the chrootNow What?See Also64. Script IP Filter RulesetsLimiting Access with IP FilterSwitching Rules on a ScheduleHacking the HackSee Also65. Secure a Wireless Network Using PFDHCP ConfigurationPF ConfigurationApache ConfigurationPutting it All TogetherSecurity ConcernsHacking the HackSee Also66. Automatically Generate Firewall RulesWhat the Script DoesInstallationExample UsageSee Also67. Automate Security PatchesPreparing the ScriptRunning the HackAutomating the ProcessSee Also68. Scan a Network of Windows Computers for VirusesPreparing the Windows SystemsPreparing the FreeBSD SystemInstalling and Running the Virus ScannerAutomating the ProcessSee Also