Bri Hatch
Personal Information
Description
Bri Hatch is Chief Hacker at Onsight, Inc. where he is a Unix/Linux and network security consultant. His clients have ranged from major banks, pharmaceutical companies and educational institutions to major California web browser developers and dot-coms that haven't failed. He has taught various security, Unix, and programming classes for corporations through Onsight and as an adjunct instructor Northwestern University. He has been securing and breaking into systems since before he traded in his Apple II+ for his first Unix system. He is also co-maintainer of Stunnel, an Open Source secure SSL wrapper used around the world to encrypt cleartext protocols.
Books
Linux+
Revision History - First Edition, February 2014 - 2012-03-07: First release - Second Edition, March 2012 - Third Edition, June 2016 - 2016-05-27: First Release - 2016-07-22: Second Release - 2016-11-11: Third Release - 2017-01-20: Fourth Release - 2017-05-26: Fifth Release
Hacking Linux exposed
Tighten holes and maintain security on your Linux system! From one of the authors of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes a must-have security handbook for anyone running Linux. This cutting-edge volume shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them. From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions. . . Learn how to think like a hacker in order to secure your Linux network In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it's readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defend against the latest Linux attacks by understanding the hacker's methods and sinister thought processes. You'll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.
Building Linux Virtual Private Networks (VPNs)
Building Linux Virtual Private Networks offers concise, step-by-step instructions for building VPNs based on both standard protocols (IPSec, SSL, SSH, PPTP) and popular Linux VPN solutions (VTun, cIPe, tinc). Through numerous examples and proven practices, you will gain important insights into choosing a VPN solution, installing and configuring it, setting up routing, configuring firewalls, measuring performance, and much more.
