Linux Network Security - Page 59

Discover Network Security News

Wireless LAN Attacks Explained

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intro Wireless LANs are popping up here, there and everywhere. Many businesses are implementing wireless LAN segments on their internal LANs because it is easy to setup and obviously there are no wires to run. Wireless allows users with laptops and . . .

Bugwatch: Secure wireless computing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is essential if you are to get the most out of wireless technology. Despite the hype it is perfectly possible to have secure wireless computing, but there are some common mistakes to avoid. This top 10 list of tips . . .

Matrix runs Un*x

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ross Vandegrift explains that he "Made it into the showing last night at Newark shopping center. There's this scene where Trinity needs to crack into a system. So what does she use?" Read on to find out.. . .

Fizzer Threat Level Rises

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Crystal Ferraro submits After a slow start late last week, spread of the mass-mailing worm soared on Monday as enterprises returned to work worldwide. UK-based e-mail scanning outsourcer MessageLabs intercepted 56,669 copies of the worm by midmorning Tuesday. More . . .

Wireless LANs Are Not Without Security Complications

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless technology has advanced noticeably lately and organisations are beginning to realise the tremendous potential the technology holds. Users are becoming more mobile than ever before. With the increasing demand to work on the move, wireless technology has an important role . . .

Taking Aim At Denial-of-service Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Graduate students from Carnegie Mellon University on Monday proposed two methods aimed at greatly reducing the effects of Internet attacks. In two papers presented at the IEEE Symposium on Security and Privacy here, the graduate students suggested simple modifications to . . .

AirDefense: N+I = No Wireless Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although wireless security was center stage during last week's Networld+Interop trade show in Las Vegas, behind the scenes was a convention floor full of misconfigured hardware resulting in malicious attacks on computers and undoubtedly many red faces. . .

Companies Still Fighting Rogue WLANs

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Enterprises continue to battle the installation of unauthorized, or rogue, wireless LAN access points (AP) on corporate networks by employees who install the increasingly cheap devices unmindful of the security risks, according to speakers here today at Computerworld's Mobile and Wireless . . .

Phreaks Threaten Voice IP Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Increasing use of voice-over-IP technology could result in a return to "phreaking" - hacking of telephony systems to make free calls. Security expert Matt Barrie said VoIP was cheap and increasingly popular, but it introduced many vulnerabilities of traditional Internet . . .

Security Patches and Negative ROI Equal Corporate Stupidity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ROI (return on investment) is a key concept in IT spending today. The board is much more likely to spend money on IT, if ROI can be demonstrated in a reasonable period of time. It's a very sensible, sound business idea. Yet, many companies are actually practicing what could be called negative ROI - they choose IT products which cost them more money the longer they have them. In the current business environment, this could be described as corporate stupidity.. . .

Honeypots: Simple, Cost-Effective Detection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lance Spitzner submits, "This one should shake up the IDS community!" This is the fourth article in an ongoing series examining honeypots. In previous installments, we have covered two different honeypot solutions: Honeyd and Specter. Both honeypots are low-interaction production solutions; their purpose is to help protect organizations, as opposed to research honeypots, which are used to gather information.. . .

Locking Down The Airwaves

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless LANs are a blessing and a curse. They offer tremendous relief to large organizations whose employees need greater flexibility and mobility. But a wireless access point is also a radio station broadcasting your company's private information. . .

Securing Your Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I just recently finished yet another security review on the network at my place of employment. I designed the different security features from scratch and I am using a variety of devices and software (firewalls, IDS, DMZs, and so on). I . . .

Wireless VPN Supports Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure wireless software developer Columbitech of Stockholm and New York, whose wireless VPN technology powers Symbol's AirBEAM brand of products, is supporting Linux servers in its latest version. This move is key for the company because it helps customers save . . .

WLAN Security: Reducing The Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Radio waves know no boundaries. Therein lies the Wi-Fi rub. Even as enterprises equip their employees with Smartphones, PDAs, and wireless laptops, the data traversing the wireless LAN can be intercepted all too easily. . .

Spammers Attack Wireless Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nearly three-quarters of malicious connections to wireless networks are used for sending spam, according to new research. Security consultant Z/Yen set up two wireless local area networks (Lans) on behalf of RSA Security to monitor unauthorised connections - a so-called . . .

How To Ward Off That Wireless Interloper

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've heard horror tales about attacks on wireless networks, so how do you go about building a secure Wi-Fi infrastructure? Here's a guide. The growing number of threats and exploits against a wireless network can be staggering. And with so . . .

Stopping DDOS Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On Thursday, February 20, 2003, at about 0130 GMT, the popular LiveJournal site became the victim of a massive distributed denial-of-service attack. LiveJournal staffers and upstream providers first tried to filter by IP, but they soon discovered what the "D" in . . .