Linux Network Security - Page 74

Discover Network Security News

Microsoft zombie hacker denial condemned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The software giant is accused of corporate hubris for issuing a flat denial that its raw socket support in Windows XP is a paradise for zombie hackers Microsoft's assurances that Windows XP will not make it easier for hackers to launch damaging Denial of Service (DoS) attacks across the Internet have been dismissed by the security expert who first alerted the company to the issue.. . .

Introduction to Port Scanning

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Port scanning is an important tool to detect what services your computer is running. Although they are getting better, many default Linux installs still leave many unnecessary services on, which can open your machine to security compromises.. . .

Special Report: Securing The New Perimeter

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

These days, the outlook for enterprise networks with a mission to safeguard corporate data is getting brighter. Weapons such as firewalls; VPNs; and increasingly sophisticated authentication, authorization, and encryption techniques (and more resistant public and private keys) are becoming more widely . . .

WorldCom Adds First-Of-Its-Kind Web-Enabled IP VPN Service

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

WorldCom, the leading global business data and Internet communications provider, today announced the immediate availability of WorldCom IP VPN Customer Directed, a first-of-its-kind service that allows customer-directed control of an outsourced IP VPN using a simple Web-based interface. This latest, highly . . .

No remedy in sight for denial of service attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Following the recent DoS attack on the US-based Computer Emergency Response Team, experts warn that there is no defence -- and the problem can only get worse. For security experts, the CERT attack and a similar series of May attacks of . . .

New targets for hackers: wireless and the home

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Home Personal Computers and wireless LANs are likely to become the next big targets for hackers according to Gunter Ollman, principal consultant with security consultants Internet Security Systems (ISS). A shift away from corporate systems to home PCs will follow applications . . .

DoS attacks becoming commonplace

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A researcher at the University of California at San Diego has documented that denial-of-service attacks are commonplace on the Internet, with an average of 4,000 occurring each week during a recent three-week study.. . .

Internet architects zero in on reliability, security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the architects of the future Internet struggle to define underlying technologies for providing a range of new network services, reliability and security are again moving to the top of the agenda. According to security experts at a meeting this week . . .

DoS attacks hit anyone, not just corporations

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Denial of service (DoS) attacks against big Internet players like Amazon.com draw media attention, but according to a new study, these electronic assaults frequently are targeted against individual personal computers. DoS attacks disable Web servers on the Internet by overloading them . . .

Cheese Worm Plugs Hole Left by Lion Worm

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this column, we look at buffer overflows in man, DQS, Netscape Enterprise Web Publisher, and IRIX Embedded Support Partner; a temporary-file race condition in the ARCservIT Unix Client; problems in Zope, Cisco Content Service Switch, CUPS, i386 . . .

Enter the Decentralized Zone

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Digital security is a trade-off. If securing digital data were the only concern a business had, users would have no control over their own computing environment at all-the Web would be forbidden territory; every disk drive would be welded shut. The . . .

Leading security expert on the end of DDoS attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Renowned private security expert Steve Gibson has been subject to two major denial of service attacks in the past fortnight. The target is Steve's Web site https://www.grc.com/intro.htm, standing for Gibson Research Company. The site sells a range of security software designed . . .

Stopping Spam on Your Linux Box

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you have an e-mail account, you are bo doubt getting mail that you have not asked for, and do not want in your inbox - unsolicited e-mail (aka spam). What's Spam? In 3D "meatspace", it is a luncheon meat manufactured . . .

Setting Up a VPN: a Tutorial

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A VPN is a Virtual Private Network. For the scope of this document, this is defined as two LANs, geographically separated, that communicate over a public network (such as the Internet) to maintain connectivity, and do so in a way that . . .

Denial-of-service warning put out by FBI cybercrime agency

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Web site administrators are being advised by the FBI's cybercrime division to be extra vigilant for evidence of distributed denial-of-service (DDOS) attacks that have recently hit Web sites. In an advisory issued this weekend by the FBI's National Infrastructure Protection Center . . .

The Wireless Revolution

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fred provides his thoughts on the state of wireless security. "Bandwidth on the run... That's what we all seem to want, but of course that's not all we get. When we use radio instead of wires we trade the limited physical . . .

Know your enemy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

To avoid these hazards, you'll need to understand how to detect and disarm malware and spot the telltale signs of hoaxes. The sections that follow describe the most common types of malware and how to avoid each.

Start your day with a cup of DoS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Start your day with a cup of DoS - Denial of Service, or a DoS, is an action undertaken by someone, usually with a single goal, to render your host or system useless for other users, by making its services unreachable. . . .

Linux Network Security: Introduction

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... However, if you do not use the Linux security tools in an appropriate way then they can be a liability. Problems can be caused by badly setup security measures. This article will seek to explain areas you should be aware . . .