Linux Network Security - Page 81

Discover Network Security News

System Fingerprinting With Nmap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When someone with half a clue decides to attack your system, he or she will first try to identify the operating system. Not every attack proceeds this way: Script kiddies probe huge address spaces looking for any system with a particular port open, which indicates that just maybe that system will be vulnerable. But for the professional penetration tester or hacker, identifying the operating system is an essential step in probing. . . .

Majority of websites vulnerable to attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two out of every three websites are open to cyber attacks, said US researcher Gartner. John Pescatore, senior security analyst at Gartner, said website intruders could at the very least change the content and in some cases access information such as customers' credit card details.. . .

Is there hope?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

What is the feasibility of running national federal elections over the Internet? SunWorld guest writer Avi Rubin focuses on the limitations of the currently deployed infrastructure, with an emphasis on concerns over the security of voting hosts and . . .

Saint 3.1 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Security Administrator's Integrated Network Tool (SAINT), an updated and enhanced version of SATAN, is designed to assess the security of computer networks. More information about SAINT can be found in the on-line documentation. This version features a new custom scan . . .

Experts fear cyber warfare

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The growing electronic war between Israeli and pro-Palestinian hackers threatens to shut down large portions of the Internet, government and industry, experts warned last night. The FBI's National Infrastructure Protection Center, the agency that combats cybercrimes, recently sent out an advisory . . .

Experts say browsers fall short on certificate alerts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A mishap that compromised the integrity of two security keys used by Sun Microsystems is fueling criticism of current methods for scrambling sensitive data and verifying identities on the Web. Sun last week issued a warning that two of its applications' . . .

Bug Watch: Can you trust mobile workers?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Bug Watch: Each week vnunet.com asks a different expert from the IT security world to give their views on recent virus and security issues, with advice, warnings and information on the latest threats. This week Jack Clark, European antivirus product manager . . .

Intel relaxed over email security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intel's dinky little eMail Station, part of the InBusiness range it inherited from Dayna, turns out to be susceptible to simple denial of service attacks, but the chip behemoth doesn't seem to care a Hell of a lot. The eMail Station . . .

Security through obscurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Is security through obscurity ever a useful way to protect your network, or does it just make things easier for corporate spies and hackers? This week in Unix Security, Carole Fennelly investigates who's benefiting from this security tactic. . . .

Wireless Devices Present New Security Challenges

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Gloomy security forecasts, rampant macro viruses, and stagnating denial-of- service attacks haven't stopped E-commerce sites from deploying more services on the Internet. Likewise, there's no sign that these events are stopping wireless developers from deploying all sorts of Web sites and . . .

Broadband Could be Hackland

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Consumers with high-speed connections to the Internet, like those provided by DSL and cable modems, are surfing at their own risk unless they take pains to protect their computers, said Frank Prince, an analyst at Forrester Research. Prince said that because . . .

Denial-of-service attacks still a big threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The types of massive distributed denial-of-service (DDOS) attacks that knocked several big e-commerce Web sites out of action earlier this year remain a viable threat that could grow even more sophisticated, according to experts at this week's government-sponsored National Information Systems . . .

Wireless Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless devices are flooding the airwaves with millions of bits of information. Securing those transmissions is the next challenge facing e-commerce. In the not-too-distant future, you won't think twice about using your cell phone or PDA to access Amazon.com, Chase . . .

Special Report: Unlocking PKI

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... PKI isn't a drop-in proposition. Someone's got to design an infrastructure for it, based on both the requirements of the technology and the structure of the organization's existing security systems. Key pairs and digital certificates must be generated, distributed, and . . .

Sniping at OpenBSD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last week several vulnerabilities with OpenBSD were announced on the full disclosure list Bugtraq. That a hole was found and exploited is not an amazing thing. The amazing and impressive thing is how long OpenBSD had gone without a local root . . .

Cyber-Crime Center Opens

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Fairfax County this week became the nerve center for the federal government's war on Internet crimes that cross international borders, with the opening of the U.S. Customs CyberSmuggling Center. . . .

Experts applaud move to close WAP security hole

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

European experts today welcomed news that US authorities have finally standardised an encryption algorithm, saying that it will help close a security hole in WAP gateways. According to cryptography experts, current encryption techniques leave wireless transactions open to fraud, but the . . .

Secure SHell now in NetBSD mainline

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An OpenSSH-based Secure Shell is now available in the main NetBSD sources. And it will be pulled into the netbsd-1-5 branch, so it will be available in NetBSD 1.5. (ssh-1.2.27 and OpenSSH were already available in the NetBSD packages collection.). . .

Tutorial - Lesson 129: Proxy Servers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

First, the proxy server acts as an intermediary, helping users on a private network get information from the Internet when they need it, while ensuring that network security is maintained. Second, a proxy server may store frequently requested information in a . . .

ICMP Stands For Trouble

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet Control Message Protocol (ICMP) is simple, as Internet protocols go. Originally described in RFC 792 by Jon Postel, ICMP provides a way for IP stacks to send simple messages containing information or errors. ICMP is important for the Internet . . .