This thesis presents TCP Stealth, a new port knocking technique designed to improve security and usability over previous port knocking designs. TCP Stealth replaces the random TCP sequence number with an authentication token that verifies the client and optionally integrity protects the first bytes of the TCP payload. The thesis describes an implementation of TCP Stealth called Knock for the Linux kernel and a library called libknockify that allows enabling Knock without recompiling applications. Experimental results show TCP Stealth is compatible with most existing Internet infrastructure.