19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In this part . . .<br />

N ow that you’re past the network level, it’s time to<br />

get down to the nitty-gritty — those fun operating<br />

systems you use on a daily basis and have come to both<br />

love and hate. I definitely don’t have enough room in this<br />

book to cover every operating system version or even<br />

every operating system vulnerability, but I certainly hit<br />

the important parts — especially the ones that aren’t<br />

easily fixed with patches.<br />

This part starts by looking at the most widely used (and<br />

picked on) operating system — Microsoft Windows. From<br />

Windows NT to Windows 8 and Server 2012, I show you<br />

some of the best ways to attack these operating systems<br />

and secure them from the bad guys. This part then looks<br />

at Linux and its less publicized (yet still major) security<br />

flaws. Many of the hacks and countermeasures I cover can<br />

apply to many other flavors of UNIX as well.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!