October 2010
Intermediate to advanced
512 pages
15h 1m
English
WHILE YOU MAY TAKE every conceivable step to secure local systems and networks, that is not enough. Tests come in real time when black-hat hackers try to break through those security measures. So before a black-hat hacker can break in, you should test systems and networks for known security issues and measures.
Any test should apply to all parts of a layered defense, from an external firewall to the passwords selected by local users. You can monitor those ports that have to be open to enable network communication. But if other ports are also open, black-hat hackers can use those ports to penetrate local systems without your knowledge. In this chapter, you'll see what ports are open and what can be done to keep ...