Chapter 2. Hack or Be Hacked
You probably took the hint by now that, put succinctly, your whole network from local power up to remote page query is one big bag of risk. What fun.
The question is: how to shore it up? You could simply trawl this tome, follow the links and, one would hope, end up with a tough nut of a site and with its wider network equally hardened. Then again, the copy-paste do this do that approach doesn't properly acquaint you with security's first friend, awareness. Hack or be hacked is designed to help here.
Chapter 1 was about theoretical awareness and, let's face it, we yawned a bit. Chapter 2 practises awareness as you take on a hacker's mindset and toolkit to gauge the risks, relative to your network, head-on:
Introduce the hacker's methodology ...
... reconnaissance, scanning, gain access, secure access, cover tracks
Carry out reconnaissance to uncover information leaks
Detour into a DNS 101 to make sense of port scanning
Take steps to secure domain names at the registrar...