Part II Manual Hardening Network daemon investigation and manipulation