Linux Network Security - Page 78

Discover Network Security News

System Fingerprinting

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When someone with half a clue decides to attack your system, they will first try to identify the operating system. Not every attack proceeds this way -- script kiddies will probe huge address spaces looking for any system with a . . .

Fix for DNS software hole released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A vulnerability recently discovered in the software used in most DNS (Domain Name System) servers may be the most serious security threat yet found on the Internet, allowing hackers effectively to shut down ISPs and corporate Web servers as well as . . .

Microsoft outsources some DNS servers to Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last week Microsoft's Web server became unavailable to many users first through router misconfiguration and later through a denial of service attack. Networking experts blamed Microsoft's problems on a network domain which they said featured all four of its domain name . . .

WHOIS Microsoft.com?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Several of Microsoft's high-profile Web sites remained inaccessible late Wednesday morning, a problem that has lasted nearly half a day and that may be the result of an attack. Since Tuesday night, the software and Internet giant has experienced . . .

Web Site Security and Denial of Service Protection

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The challenge for successful public Web sites is to encourage access to the site, while eliminating undesirable or malicious traffic, and providing the necessary levels of sufficient security without creating constraining site limitations in performance or scalability. Disruption of service caused . . .

Defenses still weak against DDoS attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mafiaboy, the Canadian teenager accused of launching a series of distributed denial of service attacks against a septet of the Internet's most popular sites last year, pleaded guilty Thursday to 56 of the 66 charges against him--just before his trial was . . .

Ramen Linux Worm Propagation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A self-propagating worm known as Ramen is currently exploiting well-known holes in unpatched Red Hat Linux 6.2 systems and in early versions of Red Hat 7.0. In addition to scanning for additional systems and propagating to vulnerable systems, the worm also . . .

F-Secure Ramen Virus Descriptions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ramen is an Internet worm, which propagates from a Linux based server to another. It works in a similar way as the Morris Worm that was widespread in 1989. Ramen affects systems running a default installations of Red Hat Linux . . .

Asta Networks claims cure for DoS attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Asta Networks will announce Wednesday it has developed router-based software that can detect Internet denial-of-service (DoS) attacks within moments, giving targeted companies precious time to react. The Seattle-based company's software detected a series of denial-of-service attacks over the Internet between Christmas . . .

Net worm hobbles Linux servers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An Internet worm cobbled together from generally available hacking tools has compromised hundreds, perhaps thousands, of Linux servers by using two well-known security flaws in applications set up during the default installation of Red Hat Linux software.. . .

Running Snort on IIS Web Servers: Part I

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Martin Roesch developed Snort in 1998 for Unix platforms. Dubbing it a "Lightweight Intrusion Detection System," Martin made the tool open source and the number of people using Snort has been growing ever since. In the summer of 2000, Mike Davis . . .

UUNet still pole-axed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Five days after being brought to its knees by spam UUNet's service is still struggling to get back to normal. In a statement issued this morning UUNet said its customers in the UK "may continue to experience some delays in email . . .

E-Commerce Unleashed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Dot-com businesses may be falling by the wayside, but the percentage of commerce happening via the Web continues to grow. Meanwhile, hundreds of millions of cellular subscribers worldwide are gaining access to new wireless data choices, including Web-enabled cell phones, handheld . . .

IRC Attack Linked to DoS Threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recent vicious cyberattacks on IRC services have now been linked to a National Infrastructure Protection Center security warning that advised systems administrators to protect their systems against a potential widespread distributed denial of service attack over New Year's weekend. . . .

Biometrics - What You Need to Know

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Biometrics have garnered increasing attention and backing in the last few years. We are promised a utopian existence: never again will you forget your password or need to remember your access card to get into the building. Unfortunately, it isn't quite . . .

Romanian hacker bombs chat network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A Romanian hacker has launched a major distributed denial of service (DDoS), forcing one of the largest IRC (Internet Relay Chat) networks, Undernet, to shut down much of its service, system administrators said Monday.. . .

Search and Seizure Evidence Retrieval and Processing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In addition to photographs and sketches of the crime scene, a detailed accounting of all computer evidence is required. The search and seizure evidence log should incude brief descriptions of all computers, devices or media located during the search for evidence. . . .