05.01.2013 Views

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

Mac OS X Leopard - ARCAism

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

358<br />

CHAPTER 20 LEOPARD NETWORKING<br />

Finger<br />

In the halcyon days of yore, when Spam was just a delicious luncheon meat and the Internet was<br />

just a military research project, a computer scientist named Les Earnest wrote a program that<br />

would take an e-mail address and “point out” who it belonged to by giving you the person’s<br />

name, whether they were logged on, and where their home directory was.<br />

When the Internet opened for general use, people soon found less earnest uses for Finger,<br />

and the protocol was eventually abandoned. The tool still exists, but mainly as way to generate<br />

the words Connection refused.<br />

Port Scan<br />

You should probably be noticing a theme with Internet tools. That is, they can be used for good<br />

or evil. Of all the tools in Network Utility, nothing fits this profile like Port Scan.<br />

In a nutshell, Port Scan tries every port on a given machine and reports back which ones are<br />

open. This is handy information for potential attackers, which makes it handy information for<br />

potential victims.<br />

It’s also useful for figuring out, say, why a particular Internet service is not working, as having<br />

its port closed will render any Internet application silent.<br />

Advanced Networking with Darwin<br />

As discussed in Chapters 18 and 19, the underlying BSD system, accessible from the Terminal<br />

application, is the place to go for advanced hacking. Many networking utilities have more<br />

options than are available from within Network Utility.<br />

There are also esoteric, specialized, and third-party tools that don’t have graphical versions<br />

and, as such, can only be run in Terminal. Even simple utilities like Ping are at your disposal, as<br />

shown in Figure 20-7.<br />

Figure 20-7. Running network tools from the command line in Terminal

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!