Linux Network Security - Page 68

Discover Network Security News

Scottish ISP floored as DDoS attacks escalate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most of the customers of Edinburgh business ISP edNET were left without Internet services yesterday after it experienced a serious distributed denial of service (DDoS) attack. edNET began to experience what it described in an email to users as a "catastrophic network failure" at around 8am yesterday.. . .

Network security tips for managers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network Security has become an important part of today's IT staffs. However, there is a small part of it that needs to be a part of everybody's understanding that works with computers that attach to the Internet. I will review some . . .

RTFM: WLan security part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the first of a two-part series looking at security issues facing wireless Lan technology, David Ludlow looks into the lengths that crackers will go to when they are trying to infiltrate your network. We've all seen the reports and news . . .

Dsniff 'n the Mirror -- PDF Version

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Argh. Thanks to Chris Longo for pointing out the bad link. Fixed. The popular article by Duane Dunston featured on LinuxSecurity.com recently has now been made available in the form of PDF, due to requests from users. "This is a practical step by step guide showing how to use Dsniff, MRTG, IP Flow Meter, Tcpdump, NTOP, and Ngrep, and others. It also provides a discussion of how and why we should monitor network traffic.". . .

XML Security Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Data contained in XML tags needs to be secured in transit over the Internet, just like any other transaction. SSL and HTTPS are sufficient for most transactions, and companies routinely add their own further encryption for the stuff that really needs . . .

Tales of a White Hat War Driver

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... how secure is this technology? What kinds of problems will IT staff encounter? One type of problem gaining national attention is called "war driving," in which a hacker can use a laptop computer to drive around and, like tuning in radio stations, can seek out personal information on wireless networks.. . .

Wireless LANs Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A nice resource of links to articles on wireless networking security. "LAN 802.11 benefits and applications have recently gained enthusiastic acceptance in workplaces where mobility is essential. Concurrently, however, WLAN security has been compromised and where security is most critical, WiFi . . .

Your Web Server Is Not A Good Hiding Place

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The sad truth is that if you keep sensitive files on any Web server, you are inviting people to view or copy those files. And not just Web servers, either. FTP servers can also be indexed by automated scanning tools, similar to Web indexing robots. The worst offenders so far have been e-commerce sites, where it is common to find database files with credit card info.. . .

A hacker's dreamland: wireless networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Should you be concerned about wireless security? Yes, at least according to Chris O'Ferrell, chief technology officer of wireless technology company Netsec. He says you should ask any organization you see using a wireless network--including your bank, the airports you visit, . . .

Connect the Dots

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you're an IT security practitioner, a phalanx of intricately aligned defense mechanisms are at your disposal. Your perimeter defense strategy comprises firewalls, routers and intrusion-detection systems. You're running intrusion-prevention software on key machines, with host-based intrusion-detection systems watching their backs. . . .

Introduction to Intrusion Protection and Network Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this introduction to protecting your computers from intrusion, the author discusses concepts of computer security. Selecting good passwords, using firewalls, and other security concepts are introduced. If your computer is not connected to any other computers and doesn't have . . .

Security: Oh, that vulnerable feeling

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There is no doubt that the Internet has brought unparalleled connectivity to computers, especially in the last few years. But ironically, this very advantage has also been the bane of hundreds of corporations, all of which critically depend on these connections . . .

New Attack Intercepts Wireless Net Messages

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A group of security researchers has discovered a simple attack that enables them to intercept Internet traffic moving over a wireless network using gear that can be picked up at any electronics store and an easily downloadable piece of freeware. The . . .

Flaw weakens Linux computers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A flaw in a software-compression library used in all versions of Linux could leave the lion's share of systems based on the open-source operating system open to attack, said sources in the security community on Monday. Several other operating systems that . . .

Best Computer Security Method Overlooked By Industry

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A team of Penn State and Iowa State researchers has tested and rated three "smart" classification methods capable of detecting the telltale patterns of entry and misuse left by the typical computer network intruder. They found that one, called "rough sets," . . .

Wireless: In the Air Tonight

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

So what has this taught us? Once again, the lesson is Security in Depth. Different teachers, different textbook, same lesson. More and more wireless networks are being deployed everyday, but I don't think that there is a corresponding increase in security . . .

SwitchSniff

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For those who think switched Ethernet environments are sniff-proof, the author offers this warning. Switches may be difficult to sniff, but they are certainly not immune. As is clear from the above sections, one method of sniffing in a switched environment is using ARP spoofing, and the machine that will most probably be ARP spoofed is the gateway.. . .