Linux Network Security - Page 55

Discover Network Security News

Security concerns hamper corporate Wi-Fi

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firms that are unconvinced about the wisdom of installing an 802.11b network may find their employees decide to rectify the situation with a trip to Dixons The booming enthusiasm for wireless connectivity among office workers is proving a headache for IT . . .

VoIP: The New Telephone Security Risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

They have their networks locked tight, their data hidden behind firewalls and their e-mail scanned by virus protection software. But too many IT managers and security officers overlook a crucial security risk: the telephone system. As voice over IP (VoIP) setups . . .

Too Much Information

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As information security technology evolves and our infosec tool belts get heavier, most veteran practitioners find themselves longing for smarter--not more--tools. Sure, we have antivirus gateways, in-line content filters, firewalls, scanners, biometric devices, crypto suites and intrusion-detection systems. And we pump thousands--if not millions--of dollars into technology-enabled solutions to our technology-created problems.. . .

The dangers of strikeback

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Who hasn't suffered from an cyberincursion and yearned to strike back at the attacker? Who didn't smile a little when the Nachi worm, which attempted to undo the damage caused by other worms, was released into the wild? "Strikeback" - actions . . .

Web services security takes shape

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure Web services took another step toward reality Monday with the introduction of implementation guidelines and progress on standards development. Analysts said that security remains an important barrier to customer adoption of Web services, a set of evolving standards for sharing information.. . .

SSH on Edge Routers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Jan Kanclirz submits This is a paper describing security meassures one should take that are often overlooked at our Edge Routers. Securing routers with secure management protocols like SSH and filtering advise to prevent unwanted attacks. . .

Wireless Network Policy Development (Part One)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The need for wireless policy has never been greater. 802.11/a/b/g wireless networks (WLANs) [1] have taken the Information Technology world by storm. With 35 million units expected to sell in 2003 and with a predicted growth rate of 50-200% compounded year . . .

Hardening the TCP/IP Stack to SYN Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most people know how problematic protection against SYN denial of service attacks can be. Several methods, more or less effective, are usually used. In almost every case proper filtering of packets is a viable solution. In addition to creating packet filters, . . .

Cyber Guerilla Networking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cyber guerillas are the newest breed of hackers. They love to hunt and sniff the air for signals emitted from the wireless handheld devices that you use to connect primarily with the WLAN. They then exploit the vulnerable network to launch . . .

Wireless Security: Is WPA Good Enough?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With wireless access points proliferating into hotels, airports and convention centers, there is a real need for security enhancements that will make the corporate world more confident in Wi-Fi technology, says Yankee Group wireless/mobile services director Roberta Wiggins. "Enterprises are . . .

Wireless Gone Wild: Time to Plan Your WLAN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One day, wireless networks will blend so seamlessly with the wired infrastructure that wireless LANs (WLANs) will cease to exist as a separate category. While that day may be indeed glimmering on the networking horizon, it definitely hasn't dawned yet. At . . .

One Big Bad World

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

No computer connected to a network is completely safe. Any computer that communicates with another, even occasionally, can fall victim to the threats that race around our interconnected world. Hackers live in any country. And the worms and viruses with the cute names -- Code Red, Blaster, Nimba, Slammer, Sobig -- don't recognize national borders.. . .

Pocket-Sized Wireless Detection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There you are: sitting in your favorite bookstore/café, sipping a caramel latte and casually leafing through the latest copy of Wired magazine when you are suddenly bombarded from almost every direction without warning and with no means to stop it. Fortunately, . . .

Analyze This!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Whether you have one machine connected to the Internet or ten thousand, keeping your network secure should be a top priority. You patch your web server and are mindful of your firewall configuration, but is your site really secure? How do you check it?. . .

Inside NIP Hype

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Battle lines have been drawn, and volleys are being lobbed between the analyst and vendor camps. In dispute: Whether intrusion prevention is out of commission or the next network security salvation. On one side, Gartner has cast intrusion detection into its . . .

Microsoft hides behind Linux for protection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Akamai's Linux-based servers to protect its Microsoft.com Web site and reduce the site's vulnerability to viruses, worms and denial of service attacks. Microsoft has been in turmoil over the past couple of weeks, after at least three significant worm and virus . . .