Linux Network Security - Page 56

Discover Network Security News

Analyze This!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Whether you have one machine connected to the Internet or ten thousand, keeping your network secure should be a top priority. You patch your web server and are mindful of your firewall configuration, but is your site really secure? How do you check it?. . .

Inside NIP Hype

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Battle lines have been drawn, and volleys are being lobbed between the analyst and vendor camps. In dispute: Whether intrusion prevention is out of commission or the next network security salvation. On one side, Gartner has cast intrusion detection into its . . .

Microsoft hides behind Linux for protection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Akamai's Linux-based servers to protect its Microsoft.com Web site and reduce the site's vulnerability to viruses, worms and denial of service attacks. Microsoft has been in turmoil over the past couple of weeks, after at least three significant worm and virus . . .

Grid Security: State Of The Art

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Until recently, many enterprises stood back and watched rather than investing in Grid computing technology. While few managers argued that tapping idle computing power can be beneficial, and that important applications can be built over a grid infrastructure, to many the . . .

Security Protection: Block That Port!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last month, some cretin Out There writes Yet Another Worm called Blaster that can infect whole networks at once. That is, it can infect whole networks of Windows computers whose administrators haven't upgraded their operating system to incorporate the latest security . . .

Slow Down Internet Worms With Tarpits

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Worms, worms are everywhere! The recent and prolific spread of Internet worms has yet again demonstrated the vulnerability of network hosts, and it's clear that new approaches to worm containment need to be investigated. In this article, we'll discuss a new . . .

OpenBSD: OS Fingerprinting Merged Into PF

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mike Frantzen recently committed OS fingerprinting capabilities to PF, OpenBSD's stateful packet filter, based on Michal Zalewski's p0f (passive OS fingerprinting) code. The functionality was also added to tcpdump. From the p0f README. . .

Network Security - Submarine Warfare

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Perimeter defense is a lost battle. Like old generals, we're still fighting the last war, in which our network was a castle with impregnable walls, a well-defined entry point across the drawbridge (head-end router), portcullis (firewall) and guards (IDS). Today's infosec . . .

The Concept of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As I sat one morning working on some loose ends, my e-mail inbox signaled the arrival of some new message. Experience is the best teacher, and my experience told me this was a new worm or virus. The attachment was . . .

Pocket Wi-Fi Sniffers End Missing Hotspot Misery

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Road warriors know the frustration: you're in a foreign city and want to find a Wi-Fi access point. Normally that means looking on the Internet for site directories that can tell you where the nearest hotspots are located, such as WiFinder . . .

Powerful Wireless Security Tools for Free

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite the best efforts of developers and standards bodies, wireless LANs (WLANs) are still the poster child for unsecured networks. Wireless network-security protocols contain enormous loopholes, coverage areas leak like a broken faucet, and many administrators do not even bother to . . .

Wireless Networking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How about a project that combines hardware construction, community building, network hacking and, of course, Linux and other free software? Best of all, the stuff you need to get started is cheap and standardized, and there's a great balance of helpful . . .

Many Bluetooth Gadgets Open To Wireless Snooping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new software tool could allow sensitive data could be pilfered through the air from laptops, mobile phones and handheld computers. An eavesdropper can use the program to identify nearby devices that use the Bluetooth wireless protocol. If the gadget's . . .

Lack of Security at Wireless Conferences

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

During the 802.11 Planet Expo in Boston, wireless security company AirDefense monitored WLAN activity and published their findings in the July 2003 edition of WLAN Watch newsletter. These are some of the fun facts AirDefense stumbled across. Suspicious and malicious activity . . .

Robot Guard Dog Protects Wi-Fi Setups

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A strange two-wheeled creature was skimming through the halls of the Alexis Park Hotel on Sunday--a robot that sniffs out network vulnerabilities. Created by two members of a loose association of security experts called the Shmoo Group, the robot is . . .

Wireless security: Harder Than You Think

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Once more I sat at the control console and went through the D-Link wireless access point's forms to enable WEP (Wired Equivalent Privacy) encryption. I knew it wasn't exactly the best encryption on the planet, but it was better than nothing . . .

Reducing Human Factor Mistakes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nowadays companies and organizations face the problem where massive attempts at illegal intrusions hit their network on a daily basis. In spite of the latest technological improvements in security, it's still the network users who are often unknowingly inviting security breaches . . .

Dos & Don'ts: Configuring Linux Routers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Even the most experienced network administrator can get stumped when configuring Linux routers, says Tony Mancill, author of Linux Routers: A Primer for Network Administrators, 2nd Ed. from Prentice Hall PTR. There are significant differences in the configuration processes for Linux, . . .

WiFi Is Open, Free and Vulnerable to Hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's how Army Lt. Col. Clifton H. Poole, who teaches classes on wireless security at the National Defense University, gets his kicks on I-66: Several times a month, Poole turns on a laptop computer in his car as he . . .