Introduction |
|
1 | (5) |
I Introducing Personal Firewalls |
|
5 | (54) |
|
Why Do You Need a Personal Firewall? |
|
|
7 | (16) |
|
The New Age of High-Speed Internet Access |
|
|
8 | (3) |
|
Traditional 56 Kbps Internet Access |
|
|
8 | (1) |
|
The New Era in High-Speed Internet Access |
|
|
9 | (2) |
|
Protecting Yourself with a Personal Firewall |
|
|
11 | (1) |
|
The Typical Internet Connection |
|
|
12 | (3) |
|
|
15 | (6) |
|
|
16 | (3) |
|
Where Do They Get Their Toys? |
|
|
19 | (2) |
|
What Do They Want from You? |
|
|
21 | (2) |
|
High-Speed Internet Connections Equal Increased Vulnerability |
|
|
23 | (18) |
|
Selecting a High-Speed Connection: Cable Versus DSL |
|
|
24 | (3) |
|
High-Speed Cable Internet Access |
|
|
24 | (2) |
|
High-Speed DSL Internet Access |
|
|
26 | (1) |
|
|
27 | (3) |
|
|
28 | (2) |
|
Setting Up Your Cable or DSL Connection |
|
|
30 | (1) |
|
|
31 | (3) |
|
Updating Your Operating System |
|
|
31 | (1) |
|
Speeding Up Your Internet Access |
|
|
31 | (3) |
|
|
34 | (1) |
|
Installing the Software Driver |
|
|
35 | (6) |
|
|
36 | (1) |
|
Installing Your High-Speed Modem |
|
|
37 | (4) |
|
|
41 | (18) |
|
Understanding Personal Firewalls |
|
|
42 | (6) |
|
What to Look for in a Personal Firewall |
|
|
42 | (1) |
|
|
43 | (3) |
|
|
46 | (2) |
|
Typical Software Firewall Requirements |
|
|
48 | (1) |
|
|
48 | (5) |
|
Understanding How Data Is Sent Between Network Computers |
|
|
49 | (1) |
|
Understanding How Computers Communicate |
|
|
50 | (1) |
|
How ISPs Use MAC Addresses |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Understanding How Firewalls Operate |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
54 | (1) |
|
Detecting Attempts to Scan Your Computer |
|
|
55 | (1) |
|
Guarding Against Trojan Horses |
|
|
56 | (1) |
|
Examining All Network Traffic |
|
|
57 | (1) |
|
|
57 | (2) |
|
Application-Gateway Firewalls |
|
|
58 | (1) |
|
Packet-Filtering Firewalls |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
II Tightening Your Security |
|
59 | (164) |
|
Locking Down Windows Networking |
|
|
61 | (20) |
|
An Overview of Microsoft Networking |
|
|
62 | (12) |
|
Introducing Microsoft Networking |
|
|
62 | (1) |
|
Understanding How Microsoft Networking Is Implemented |
|
|
63 | (1) |
|
Trusting Microsoft Networks |
|
|
64 | (4) |
|
Closing Down Your NetBIOS Ports |
|
|
68 | (1) |
|
Protecting Printers and Disk Drives from Internet Intruders |
|
|
69 | (1) |
|
Configuring Communications for Home Networks |
|
|
70 | (4) |
|
|
74 | (5) |
|
Implementing Usernames and Passwords |
|
|
75 | (1) |
|
|
75 | (2) |
|
|
77 | (2) |
|
Why You Should Still Get a Personal Firewall |
|
|
79 | (2) |
|
|
81 | (18) |
|
|
82 | (1) |
|
The BEFSR41 EtherFast Cable/DSL Router |
|
|
83 | (1) |
|
Installing the Hardware Firewall |
|
|
84 | (3) |
|
Configuration via the Web Browser |
|
|
87 | (7) |
|
Establishing Basic Configuration Settings |
|
|
87 | (2) |
|
|
89 | (1) |
|
Checking the Status of Your Router |
|
|
89 | (1) |
|
Configuring Your DHCP Service |
|
|
90 | (1) |
|
Setting Your Router/Firewall Logs |
|
|
91 | (2) |
|
|
93 | (1) |
|
Other Cable/DSL Router Functions |
|
|
94 | (2) |
|
Using the Linksys BEFSR41 EtherFast Cable/DSL Router As a Personal Firewall |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
99 | (26) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (2) |
|
Working with the Configuration Wizard |
|
|
104 | (4) |
|
|
108 | (11) |
|
Saving Configuration Changes |
|
|
110 | (1) |
|
Securing Configuration Changes |
|
|
110 | (1) |
|
Managing the McAfee Personal Firewall's Log File |
|
|
111 | (1) |
|
Starting the Firewall at System Boot |
|
|
111 | (1) |
|
Closing the McAfee Personal Firewall |
|
|
111 | (1) |
|
Configuring Application Settings |
|
|
111 | (1) |
|
|
112 | (5) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Reporting Summary Application Information |
|
|
119 | (1) |
|
Reporting Detailed Application Information |
|
|
119 | (1) |
|
|
119 | (4) |
|
|
123 | (1) |
|
Testing the McAfee Personal Firewall |
|
|
124 | (1) |
|
|
125 | (26) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Configuring BlackICE Defender |
|
|
130 | (8) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Gathering Information About Your Attacker |
|
|
134 | (1) |
|
Managing Specific IP Addresses |
|
|
135 | (2) |
|
The ICEcap Property Sheet |
|
|
137 | (1) |
|
Establishing Interface and Alert Settings |
|
|
137 | (1) |
|
Keeping BlackICE Defender's Defenses Up to Date |
|
|
138 | (3) |
|
Automatically Updating Your Personal Firewall |
|
|
138 | (2) |
|
Manually Updating Your Personal Firewall |
|
|
140 | (1) |
|
|
141 | (8) |
|
|
141 | (6) |
|
Advanced Firewall Settings |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
BlackICE Defender's Limitations |
|
|
149 | (1) |
|
Testing the BlackICE Defender Personal Firewall |
|
|
150 | (1) |
|
|
151 | (26) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (4) |
|
Getting Started with ZoneAlarm |
|
|
157 | (1) |
|
|
158 | (9) |
|
Managing Internet Alerts and Firewall Logging |
|
|
160 | (1) |
|
Working with Internet Lock Settings |
|
|
161 | (1) |
|
Configuring Security Settings |
|
|
162 | (2) |
|
Managing Your Internet Applications |
|
|
164 | (2) |
|
Basic ZoneAlarm Configuration |
|
|
166 | (1) |
|
Working with the ZoneAlarm Desk Band Toolbar |
|
|
167 | (1) |
|
ZoneAlarm's Alerts and Log File |
|
|
168 | (2) |
|
Working with ZoneAlarm's Log File |
|
|
168 | (2) |
|
Working with ZoneAlarm Alerts |
|
|
170 | (4) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Testing Your Zone Labs Personal Firewall |
|
|
174 | (3) |
|
How Secure Is Your Computer? |
|
|
177 | (12) |
|
Testing Your Vulnerability to Internet Hackers |
|
|
178 | (5) |
|
Performing a Free Security Scan |
|
|
178 | (4) |
|
|
182 | (1) |
|
Testing with Your Personal Firewall Up and Running |
|
|
183 | (2) |
|
Rerunning the Internet Scan |
|
|
184 | (1) |
|
Probing Your Ports a Second Time |
|
|
184 | (1) |
|
Testing Security from the Inside Out |
|
|
185 | (3) |
|
|
188 | (1) |
|
Habits of Security-Conscious Surfers |
|
|
189 | (14) |
|
Updating Your Personal Firewall |
|
|
190 | (1) |
|
Updating McAfee Personal Firewall |
|
|
190 | (1) |
|
Updating BlackICE Defender |
|
|
190 | (1) |
|
|
191 | (1) |
|
Keeping Your Microsoft Operating System Up-to-Date |
|
|
191 | (3) |
|
Keeping Your Operating System Locked Down Tight |
|
|
194 | (1) |
|
|
195 | (4) |
|
|
196 | (2) |
|
|
198 | (1) |
|
Don't Become a Zombie--Help Prevent Distributed Denial-of-Service Attacks |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | (1) |
|
Be Vigilant and Test Often |
|
|
201 | (2) |
|
Home Networks and Internet Connection Sharing |
|
|
203 | (20) |
|
|
204 | (1) |
|
Putting Your Network Together |
|
|
205 | (1) |
|
Network Software Configuration |
|
|
205 | (2) |
|
|
207 | (6) |
|
Setting Up Workgroup and Computer Names |
|
|
207 | (2) |
|
Sharing Network Resources |
|
|
209 | (4) |
|
Connecting Your Home Network to the Internet |
|
|
213 | (5) |
|
Tightening Things Up with a Second Line of Firewalls |
|
|
218 | (2) |
|
Microsoft's Internet Connection Sharing |
|
|
220 | (2) |
|
Securing Home Networks with NetBEUI |
|
|
222 | (1) |
A Other Firewall Products |
|
223 | (8) |
|
Aladdin Knowledge Systems eSafe Desktop 3.0 |
|
|
224 | (1) |
|
Norton Personal Firewall 2001 |
|
|
225 | (1) |
|
|
226 | (1) |
|
Symantec Desktop Firewall 2.0 |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (2) |
B Other Web Sites That Will Test Your Security |
|
231 | (8) |
|
|
232 | (1) |
|
Gibson Research Corporation |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (3) |
Glossary |
|
239 | (8) |
Index |
|
247 | |