How to Cheat at Configuring Open Source Security Tools by