Advertisement
Membership
Login
ACCU Buttons
Search in Book Reviews
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
Last month there was a concerted 'denial of service attack' on the root DNS servers of the Internet. (Excuse me if my terminology is not exactly correct, the substance is). There are thirteen of these that are widely distributed geographically to ensure that they cannot all be destroyed by a physical attack. Those responsible believe that at least five of these servers must be operating for the Internet to continue to function at all levels. It is a bit like cutting the roots of a tree, cut enough of them and the tree will continue to appear to live on the surface but problems will increasingly manifest as it dies.
The 'denial of service' attack took out seven of the root servers for an hour and intermittently took out two others. Do the arithmetic and you will realise that we were close to the critical boundary. Denial of service relies on being able to pervert ordinary computers so those massive amounts of data are dispatched from many places to the computer(s) being attacked. By itself your little machine is pretty harmless, couple it with a few million others and we have a very different scenario.
Now the real problem is that there is no way that the ordinary member of the public is going to understand how to defend their computer from being hijacked to do nefarious deeds. All that most of us can do is to insist that those having long-term Internet connections should add such things as firewalls and keep them up to date. The latter is a serious problem. Failing to back-up your own data is your choice, but failing to protect your equipment from being perverted is potentially harmful to the wider community.
Enough said. Most will not have time to read this book, but the more that make time the more likely that the message about our computers vulnerability will get spread. Note that I have not said anything about this book, only why you might make time to read it. Let me finish with a quotation from the Introduction.
The primary difference between this second edition and the original Hack Attacks Revealed, aside from some rectified errata, is more than 170 new advanced discovery techniques, malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and more; current vulnerabilities, advisories, and hacking labs, plus additional illustrations, and techniques for routers, operating systems (including Windows 2000/Pro and XP, Solaris, LINUX), and server softwaredaemons. You'll also find a special chapter dedicated to the Top 75 Hack Attacks. To accommodate the new material, in this edition, most of the extraneous information, lists, and some source code has been moved from the body of the book to the CD-ROM.A traditional Chinese curse is 'May you live in interesting times.' Well we do and we need to do our bit to make them less interesting.