V. Appendixes

This part discusses some of the most common ways an intruder can breach your system or intercept your data in transit. This part also details some of the most commonly used services and their associated port numbers, which can be useful to administrators looking to mitigate the risks of being cracked.

Table of Contents
A. Common Exploits and Attacks