Linux Network Security - Page 57

Discover Network Security News

WLAN Security Apps Tighten IT's Net Control

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As Wi-Fi standards get sorted out and customers clamor for better security, two vendors this week are set to introduce WLAN security products that give IT staffs greater power and flexibility in locking down their networks. Offerings from AirDefense Inc. and . . .

Networks Under Attack Following Cisco Router Flaw

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A software flaw in routers discovered by networking giant Cisco (Nasdaq: CSCO) has forced Internet carriers and others to apply fixes quickly before attackers cause network outages by exploiting the vulnerability. Exploit code that takes advantage of the flaw was . . .

When your server ends up a Warez site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A week before publishing this paper, I opened an anonymous ftp site on my home machine, expecting a few connections. I also wanted to see what people would do if I gave them write access. Within 3-4 days of my server . . .

Camouflaging Nmap Scans

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's a boring Friday evening - mortals with brains the size of peanuts fill up the local joint exposing whatever is left of their gray matter to the savageness of fermented glucose whilst my DNA donors enjoy the comforts of the . . .

Cisco Admits Flaw in Networking Software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco Systems Inc. has found a serious vulnerability that can be used to essentially disable virtually any device running the company's Internetwork Operating System software, including its ubiquitous routers and switches. The vulnerability arises from IOS' failure to correctly handle . . .

Scanning Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scanning helps one to know what services are running on a machine. This will show the open ports on which services are listening for connections. First we will determine whether the target machine is alive or not. This can be . . .

Network Security Warnings Ring Out

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Several computer and Internet security experts warned this week that while threats are on the rise and the lag time between vulnerability and attack is shrinking, government and the private sector have failed to team effectively on Internet security, leaving infrastructure . . .

Network Content Analysis Platform

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sergei Egorov submits This paper describes a Network Content Analysis Platform (NCAP) suitable for a variety of applications requiring access to all layers of network traffic including the content of TCP/IP network data exchanges. NCAP is capable of operating . . .

Searching for Wi-Fi Security Solutions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At the recent Boston 802.11 Planet Conference and Expo, the aisles and booths were bustling with activity, giving ample proof that Wi-Fi (Wireless Fidelity, or more properly, wireless networking) has finally come of age. The hardware gear venders - switch, carriers, . . .

Walk-By Hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We've got 12 . . . wait, 13. Another just came in!'' On the hunt for 30 seconds, Gary Morse is jazzed. We've walked about 45 feet down Avenue of the Americas in Midtown Manhattan, and he has been counting . . .

The ABCs of Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It requires constant vigilance, with regular applications of available network patches. The ideal approach for most companies is to have a day-to-day scanning program along with patch management--done either internally or outsourced to a consultant. It's a jungle out there. Just . . .

Securing Wireless Campus Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While no Ethernet-based network can be considered a "secure" communications medium, network operators take some solace that the exposure of traffic for a LAN is limited to those stations that have "physical access" to it. With a wireless LAN (WLAN), there . . .

Careless PDA Users Threaten Corporate Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

More people are using PDAs for keeping business data, increasing the security problems faced by corporates, according to the second annual PDA Usage Survey. Billions of pounds continue to be wasted each year on corporate security that is easily bypassed . . .

Satellite Comms Security Risk Warning

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Local networking and maintenance specialist Des Little, MD of black-owned Computer Pro, says local companies will have to up their security as SA's telecommunications industry is deregulated. Little says local companies and local telecoms service providers are going to have . . .

Looking securely at TCP/IP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you are reading this article, you should have a good understanding of how computers work and a working knowledge of how to use Internet tools such as web browsers, Telnet, and e-mail. In addition, you're probably already aware of the . . .

Better 802.11 Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you've delayed setting up a wireless network because of security concerns, help is at hand. Around the time you read this, improved security technology for all variants of 802.11 should be available as free firmware downloads from most equipment vendors. . . .

Wireless Hunters on the Prowl

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mike Outmesguine leans against a Chevy Suburban packed with Wi-Fi, GPS and ham radio gadgets, gazing out at the necklace of hilltop radio towers that surround Los Angeles' Chinatown. "The cool thing about war driving is that it makes what's . . .

Deploying WPA Today

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's no secret that Wi-Fi LAN security is in a fairly abysmal state. Wi-Fi Protected Access is a security mandate that could prompt even lax companies to upgrade their systems. Any business running Wi-Fi LANs should upgrade to Wi-Fi Protected . . .