Linux Network Security - Page 77

Discover Network Security News

Computer forensics booms as importance of electronic evidence grows

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer forensics, once a discipline restricted to a small cloister of law enforcement officers, is now a booming business. Demand for the services is exploding as electronic evidence becomes more widely used in court and as companies become increasingly concerned about the use of computer networks for corporate spying and other mischief.. . .

Eliminating IP Address Forgery - 5 Years Old and Going Strong

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection program success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of . . .

P2P, OR NOT P2P?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Napster, Gnutella, IM and other peer-to-peer applications are the "flavor of the week." But if you're not careful, these programs could be used to undermine your network security. P2P applications are hot nowadays because they allow users to share the massive . . .

Secure Remote Log Servers Using SCP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A few months ago, I challenged myself with a problem. I wanted to implement centralized system logging that would securely store logs in a location that would prevent any tampering or mischief. It was necessary to find a solution that fit . . .

Testing Your Security by Breaking In - NOT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection program success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of . . .

Outage Shows Network InSecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security experts say site managers and enterprise e-commerce managers can take many steps to ward off or minimize the effects of these attacks. But to choke them off at the source and then identify the perpetrators "would take . . .

'CrackWhore' a boon to password-request sites

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A brute-force password cracking program called CrackWhore written by our Dutch friend SubReality turns out to be clever for more than its name. The author has rigged it with a phone-home feature (which users can disable) that sends the password combos . . .

A year later, DDoS attacks still a major Web threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The DDoS (distributed denial of service) attack that knocked out Yahoo used a host of hacked servers--dubbed "slaves" or "zombies"--to inundate a Web site or Internet-connected server with data, effectively stopping the server's ability to respond to Web page requests or . . .

Security hole in ChiliSoft ASP for Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ASP (Active Server Pages) are a technology initially developed by Microsoft to tackle the "dynamic content on the web" problem. Chili!Soft is a company that has released a piece of software called Chili!Soft ASP that makes ASP functionality available on . . .

The Internet: It's Full of Holes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An invisible snoop may be virtually peering over your shoulder right now. Computer crackers can read your e-mail, collect your credit card data, intercept the information you send wirelessly or pry into your private files.. . .

Case Study: Building a small-business VPN

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It was a common enough problem for a small business: AMT Asset Management, a Marlboro, New Jersey-based brokerage with six employees, needed a way to connect its Boca Raton, Florida office to headquarters. The goal was to provide the smaller office . . .

Security Still Up in the Air

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The idea of a wireless LAN has always had a certain charm -- suggesting an end to the expense and inconvenience of running cable, and to users' whining about being tethered to their desks. And now, with wireless standards firming up, . . .

CERT issues advisory on Net server software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CERT's advisory is the latest in a long series of problems both with the Berkeley Internet Name Domain (or BIND) server software and the DNS system in general. CERT alone has issued 12 advisories about exploits or vulnerabilities in the software . . .

Net Present Value of Information Security: Part I

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ebusiness offers tremendous opportunities for reducing costs and improving revenues. However, along with the advantages it also brings new threats and liabilities that leave businesses highly vulnerable to cyber attack and fraud. Business today must be concerned with the impact of . . .