Hackers can scan a network using Access software, but once they try to connect, the terminals disappear.
Unauthorised inbound connections are redirected to the system administrator to set up a new digital authentication key, encrypting the TCP/IP data using 2048-bit polymorphic encryption.
But security consultant Neil Barrett said that the technology sounded similar to IPv6, which provides the option to digitise every packet sender, ensuring that each connection is received from an authorised address. "If this system does offer that level of assurance, it is valuable. But why not use IPv6? This also provides the means of shutting down unauthorised inbound connections," he said.
[ All of article ]
The link for this article located at vnunet is no longer available.