Product: 0596006438
Overall, I find this book to be an enjoyable read. I thumb through it time and time again, and come up with some useful hints and tips (not really necessarily hacks though). It’s more oriented toward BSD Unix and Linux, but I did find some useful hints for Windows (the current topic of my studies). I really like the plug for ntsyslod (hack 56), which can take binary event logs and route them to syslogd service. Nice. Finally, logs in Windows are now open for business.
I found some material to be trivial, making problems from non-problems, or rather not practical to implement. For example, one hint advises Windows users to encrypt their temp directory (hack 28). However, there are easy workarounds to bypass EFS, and the temp directory is within a user’s profile, and thus secured from other users anyhow. So encrypting it is unecessary, and not useful given users can drag a file to a floppy or non-NTFS filesystem to and bypass the encryption.
One hack recommended flush the page file as some important application data might be in there (hack 29). However, this requires delving into the registry, and to implement across all workstations is too taxing. However, there could be ways to automate this through group policy objects and scripts. There’s no coverage on how to automate some of these chores, which is not always straightforward in Windows.
One a final note, I wish there was more coverage of Windows. There’s could be equivelent coverage of things like time sychronization (hack 44) for Windows as well.
Overall though, I think there are enough useful tips to make this book valuable. I’ve already wrote my name on this one…
Rating: 3
0596006438
Count: 6
Review by TheRealDarknerd
on 2020-03-10