About the Authors |
|
xvii | |
About the Technical Reviewer |
|
xix | |
Acknowledgments |
|
xxi | |
Introduction |
|
xxiii | |
|
|
|
|
3 | (24) |
|
Securing the Mac OS X Defaults |
|
|
3 | (1) |
|
Customizing System Preferences |
|
|
4 | (17) |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
8 | (2) |
|
|
10 | (2) |
|
Infrared Controls in Security Preferences |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (2) |
|
|
16 | (3) |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
21 | (2) |
|
Using the Secure Empty Trash Feature |
|
|
23 | (1) |
|
Using Encrypted Disk Images |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (20) |
|
|
28 | (1) |
|
The Accidental Mac Administrator |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
In the Beginning...the Command Line |
|
|
32 | (4) |
|
|
36 | (2) |
|
|
37 | (1) |
|
Physical Devices and Optical Media |
|
|
38 | (1) |
|
Firmware and Firmware Password Protection |
|
|
38 | (6) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
39 | (5) |
|
Multifactor Authentication |
|
|
44 | (1) |
|
Keeping Current: The Cat-and-Mouse Game |
|
|
45 | (1) |
|
|
46 | (1) |
|
A Word About Parallels and Boot Camp |
|
|
46 | (1) |
|
|
47 | (28) |
|
Introducing Authentication, Authorization, and Identification |
|
|
47 | (1) |
|
|
48 | (14) |
|
Introducing the Account Types |
|
|
49 | (2) |
|
|
51 | (1) |
|
Enabling the Superuser Account |
|
|
52 | (2) |
|
Setting Up Parental Controls |
|
|
54 | (6) |
|
Managing the Rules Put in Place |
|
|
60 | (2) |
|
Restricting Access with the Command Line: sudoers |
|
|
62 | (6) |
|
|
68 | (1) |
|
SUID Applications: Getting into the Nitty-Gritty |
|
|
69 | (1) |
|
Creating Files with Permissions |
|
|
70 | (5) |
|
Part 2 Security Essentials |
|
|
|
Malware Security: Combating Viruses, Worms, and Root Kits |
|
|
75 | (18) |
|
|
75 | (5) |
|
The Real Threat of Malware on the Mac |
|
|
77 | (2) |
|
|
79 | (1) |
|
Socially Engineered Viruses |
|
|
79 | (1) |
|
|
80 | (7) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (3) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Best Practices for Combating Viruses |
|
|
86 | (1) |
|
|
87 | (6) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (4) |
|
Securing Web Browsers and E-mail |
|
|
93 | (32) |
|
A Quick Note About Passwords |
|
|
93 | (1) |
|
Securing Your Web Browser |
|
|
94 | (9) |
|
|
94 | (3) |
|
|
97 | (6) |
|
Configuring Mail Securely |
|
|
103 | (6) |
|
|
103 | (3) |
|
|
106 | (3) |
|
|
109 | (4) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Using White Listing in Entourage |
|
|
112 | (1) |
|
Using PGP to Encrypt Mail Messages |
|
|
113 | (6) |
|
|
114 | (5) |
|
|
119 | (1) |
|
Using Mail Server-Based Solutions for Spam and Viruses |
|
|
119 | (5) |
|
|
120 | (2) |
|
Mac OS X Server's Antispam Tools |
|
|
122 | (1) |
|
|
123 | (1) |
|
Outsourcing Your Spam and Virus Filtering |
|
|
124 | (1) |
|
Reviewing Logs and Monitoring |
|
|
125 | (24) |
|
What Exactly Gets Logged? |
|
|
125 | (2) |
|
|
127 | (2) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Reviewing User-Specific Logs |
|
|
130 | (2) |
|
|
132 | (3) |
|
Secure.log: Security Information 101 |
|
|
133 | (1) |
|
|
133 | (2) |
|
Breaking Down Maintenance Logs |
|
|
135 | (5) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
Parallels and Bootcamp Logs |
|
|
140 | (3) |
|
|
140 | (2) |
|
|
142 | (1) |
|
|
143 | (1) |
|
Review Regularly, Review Often |
|
|
143 | (6) |
|
|
143 | (1) |
|
|
144 | (5) |
|
|
|
|
149 | (22) |
|
|
149 | (2) |
|
|
151 | (3) |
|
|
151 | (1) |
|
Configuring Peer-to-Peer Networks |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (6) |
|
|
154 | (3) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
Stateful Packet Inspection |
|
|
160 | (1) |
|
|
160 | (1) |
|
Understanding Switches and Hubs |
|
|
160 | (3) |
|
Restricting Network Services |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (2) |
|
|
167 | (2) |
|
|
169 | (2) |
|
Setting Up the Mac OS X Firewall |
|
|
171 | (26) |
|
Introducing Network Services |
|
|
171 | (2) |
|
|
173 | (2) |
|
|
175 | (4) |
|
Working with the Firewall in Leopard |
|
|
175 | (2) |
|
Working with Default Services in Tiger |
|
|
177 | (1) |
|
Allowing Non-Apple Services in Tiger |
|
|
178 | (1) |
|
Setting Advanced Features |
|
|
179 | (3) |
|
|
182 | (1) |
|
Using Mac OS X to Protect Other Computers |
|
|
183 | (2) |
|
Using Third-Party Firewalls |
|
|
185 | (2) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Working from the Command Line |
|
|
187 | (10) |
|
Getting More Granular Firewall Control |
|
|
187 | (2) |
|
|
189 | (4) |
|
|
193 | (4) |
|
Securing a Wireless Network |
|
|
197 | (30) |
|
Wireless Network Essentials |
|
|
198 | (1) |
|
Introducing Apple AirPort |
|
|
199 | (1) |
|
Configuring Older AirPorts |
|
|
200 | (3) |
|
|
202 | (1) |
|
Configuring Current AirPorts |
|
|
203 | (10) |
|
|
206 | (1) |
|
|
207 | (2) |
|
|
209 | (1) |
|
Hiding a Wireless Network |
|
|
210 | (1) |
|
Base Station Features in the AirPort Utility |
|
|
211 | (1) |
|
|
211 | (1) |
|
Wireless Security on Client Computers |
|
|
212 | (1) |
|
Securing Computer-to-Computer Networks |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (6) |
|
|
215 | (2) |
|
Detecting Rogue Access Points |
|
|
217 | (1) |
|
iStumbler and Mac Stumbler |
|
|
217 | (3) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
General Safeguards Against Cracking Wireless Networks |
|
|
222 | (5) |
|
|
|
|
227 | (188) |
|
The Risks in File Sharing |
|
|
227 | (1) |
|
Peer-to-Peer vs. Client-Server Environments |
|
|
227 | (1) |
|
|
228 | (1) |
|
Getting More Out of Permissions with Access Control Lists |
|
|
229 | (1) |
|
Sharing Protocols: Which One Is for You? |
|
|
230 | (16) |
|
|
231 | (2) |
|
|
233 | (2) |
|
Using Apple AirPort to Share Files |
|
|
235 | (4) |
|
|
239 | (6) |
|
|
245 | (1) |
|
|
246 | (3) |
|
|
249 | (22) |
|
|
249 | (3) |
|
Introducing the httpd Daemon |
|
|
250 | (1) |
|
Removing the Default Files |
|
|
251 | (1) |
|
Changing the Location of Logs |
|
|
251 | (1) |
|
|
252 | (2) |
|
|
252 | (1) |
|
Restricting Apache Access |
|
|
252 | (1) |
|
Running on a Nonstandard Port |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Disabling Unnecessary Services in Apache |
|
|
254 | (1) |
|
|
254 | (2) |
|
|
255 | (1) |
|
Tightening PHP with Input Validation |
|
|
255 | (1) |
|
|
256 | (2) |
|
Securing Your Perl Scripts |
|
|
256 | (2) |
|
|
258 | (2) |
|
Blocking Hosts Based on robots.txt |
|
|
259 | (1) |
|
|
260 | (3) |
|
Using the .htaccess File to Customize Error Codes |
|
|
261 | (1) |
|
Using .htaccess to Control Access to a Directory |
|
|
262 | (1) |
|
Tightening Security with SSL |
|
|
263 | (1) |
|
Implementing Digital Certificates |
|
|
264 | (1) |
|
Protecting the Privacy of Your Information |
|
|
264 | (4) |
|
|
266 | (1) |
|
|
267 | (1) |
|
Securing Files on Your Web Server |
|
|
268 | (1) |
|
Securing Directory Listings |
|
|
269 | (1) |
|
|
270 | (1) |
|
Cross-Site Scripting Attacks (XSS) |
|
|
270 | (1) |
|
|
271 | (22) |
|
Built-In Remote Management Applications |
|
|
272 | (6) |
|
|
272 | (2) |
|
|
274 | (1) |
|
|
275 | (3) |
|
|
278 | (4) |
|
|
282 | (2) |
|
|
283 | (1) |
|
|
284 | (9) |
|
Connecting to Your Office VPN |
|
|
284 | (1) |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
287 | (6) |
|
|
293 | (50) |
|
Limiting Access to Services |
|
|
293 | (1) |
|
|
294 | (1) |
|
Foundations of a Directory Service |
|
|
295 | (2) |
|
|
295 | (1) |
|
|
296 | (1) |
|
Configuring and Managing Open Directory |
|
|
297 | (26) |
|
Securing LDAP: Enabling SSL |
|
|
300 | (1) |
|
Securing Open Directory Accounts by Enabling Password Policies |
|
|
301 | (2) |
|
Securing Open Directory Using Binding Policies |
|
|
303 | (2) |
|
Securing Authentication with PasswordServer |
|
|
305 | (2) |
|
Securing LDAP by Preventing Anonymous Binding |
|
|
307 | (2) |
|
Securely Binding Clients to Open Directory |
|
|
309 | (2) |
|
Further Securing LDAP: Implementing Custom LDAP ACLs |
|
|
311 | (1) |
|
Creating Open Directory Users and Groups |
|
|
311 | (3) |
|
Securing Kerberos from the Command Line |
|
|
314 | (1) |
|
|
315 | (2) |
|
Enhanced Security for Managed Preferences in Leopard |
|
|
317 | (2) |
|
Providing Directory Services for Windows Clients |
|
|
319 | (1) |
|
Active Directory Integration |
|
|
320 | (3) |
|
Web Server Security in OS X Server |
|
|
323 | (3) |
|
|
323 | (2) |
|
|
325 | (1) |
|
File Sharing Security in OS X Server |
|
|
326 | (7) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (3) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Wireless Security on OS X Server Using RADIUS |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (2) |
|
|
337 | (1) |
|
|
337 | (1) |
|
Server Admin from the Command Line |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (4) |
|
Limiting the Protocols on Your Server |
|
|
340 | (3) |
|
|
|
Network Scanning, Intrusion Detection, and Intrusion Prevention Tools |
|
|
343 | (30) |
|
|
343 | (8) |
|
|
344 | (2) |
|
|
346 | (1) |
|
|
347 | (1) |
|
Vulnerability and Port Scanning |
|
|
347 | (4) |
|
Other Scanning Techinques |
|
|
351 | (1) |
|
Intrusion Detection and Prevention |
|
|
351 | (10) |
|
Host Intrusion Detection System |
|
|
351 | (2) |
|
|
353 | (1) |
|
Network Intrusion Detection |
|
|
353 | (8) |
|
Security Auditing on the Mac |
|
|
361 | (12) |
|
|
361 | (1) |
|
|
362 | (7) |
|
|
369 | (4) |
|
Backup and Fault Tolerance |
|
|
373 | (22) |
|
|
373 | (6) |
|
Restoring Files From Time Machine |
|
|
377 | (1) |
|
Using a Network Volume for Time Machine |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
380 | (3) |
|
|
383 | (7) |
|
Configuring Retrospect Backup to Tape |
|
|
384 | (4) |
|
Installing the Retrospect Client |
|
|
388 | (1) |
|
Checking Your Retrospect Backups |
|
|
389 | (1) |
|
|
390 | (1) |
|
Backup vs. Fault Tolerance |
|
|
391 | (4) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
393 | (2) |
|
|
395 | (20) |
|
|
395 | (1) |
|
|
396 | (16) |
|
Installing MacForensicsLab |
|
|
397 | (4) |
|
|
401 | (2) |
|
|
403 | (2) |
|
|
405 | (2) |
|
|
407 | (3) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
Other GUI Tools for Forensic Analysis |
|
|
412 | (1) |
|
Command-Line Tools For Forensic Analysis |
|
|
413 | (2) |
Appendix A Xsan Security |
|
415 | (4) |
Appendix B Acceptable Use Policy |
|
419 | (6) |
Appendix C Secure Development |
|
425 | (2) |
Appendix D Introduction to Cryptography |
|
427 | (4) |
Index |
|
431 | |