Linux Network Security - Page 83

Discover Network Security News

Logging with Apache--Understanding Your access_log

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Apache comes with built-in mechanisms for logging activity on your server. In this series of articles, I'll talk about the standard way that Apache writes log files, and some of the tricks for getting more useful information and statistics out of . . .

VPNs take center stage

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Virtual private networks merge IP technology with encryption to offer significant cost savings on WAN traffic.Sure you want a VPN. It can save you money. It can give you a better-meshed network. It can let more people share your enterprise resources . . .

Is a Firewall Enough?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Erick Lee writes: "Is a firewall enough to provide security to your network? The answer is no. A common misconception is that firewalls recognize attacks and block them. In fact, firewalls perform only limited, specific functions in network security." . . .

Specter Of network attacks looms anew

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet service providers and dot-coms hit by a storm of denial-of-service attacks earlier this year should brace for another onslaught, say knowledgeable security experts. Simple Nomad, aka Mark Loveless, a senior security analyst at information management and security company BindView, unveiled . . .

Openhack: Lessons learned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When it comes to security, build for success, but plan for failure. eWEEK Labs' Openhack.com e-business site was built from the ground up with security in mind, and the site was co-designed and co-maintained by security company Guardent Inc. Yet Openhack . . .

The Reality of Building Secure Private Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"IPSec is beginning to support key business and technology objectives such as B2B extranet backbones and dial access VPN's for remote computing. Despite the security and operational benefits of a VPN, the problem of authenticating client entities for access control decisions . . .

Excite@Home IP flaw exposed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Excite@Home -- an Internet service run in Australia by Cable & Wireless Optus -- has warned it will take action against anybody who attempts utilise an IP vulnerability that allows a single user to block up to 127 IP addresses, effectively . . .

Tools of the Trade: nmap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The intent of this article is to familiarize the reader with the network scanner nmap. As Lamont Grandquist (an nmap contributor/developer) points out, nmap does three things: It will ping a number of hosts to determine if they are up. It . . .

Users fail to see full security picture

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Businesses are still not ready to take an enterprise approach to security, according to leading vendor Network Associates (NAI). Despite consolidation in the market - including the $975m buy-out of security firm Axent by anti-virus specialist Symantec last week - NAI . . .

Digital Signatures and Stolen Automobiles

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Digital signatures require extensive safekeeping. Unlike passwords, you can't store them in your head. The number sequence is too long. You have to store the signature on a smart card, keep it on your hard drive, or carry it around on . . .

We're still getting security wrong

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Worries about security, and justified ones at that, could still stop the eCommerce bandwagon in its tracks, it seems. The recent revelation of a security loophole in MS Outlook has been followed by a report from IDC asserting that corporate Europe . . .

Denial-of-service threat gets IETF's attention

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet Engineering Task Force (IETF) last week launched a working group to develop ICMP Traceback Messages, which would let network managers discover the path that packets take through the Internet. Nicknamed itrace, the new working group plans to submit a . . .

Linux Networking: Using Ipchains

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The article examines the basic concepts pertaining to routing, network address translation (NAT), firewalls, and a program called ipchains. Individual sections address each concept. The last section combines the basics into a sample configuration for linking a local network to . . .

Secure Directory Services for E-Business, Part 3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The threats to a directory are many, and if appropriate safeguards are not maintained, a company may not even know when a directory has been compromised. The primary threats include theft, destruction and alteration of information (including user privileges). The potential . . .

IPSec - We've Got a Ways to Go

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IPSec, supposedly the next great thing that will fix most (if not all) our network security problems. No longer will attackers be able to sniff network traffic, hijack connections or spoof servers. Hijacking domain names will be impossible with DNSSEC, and . . .

ADSL fundamentally insecure - BT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The head of broadband services at BT has acknowledged that its implementation of ADSL lacks security and it will be up to third parties to ensure customers' data is unhackable. Chris Gibbs, who is masterminding the introduction of ADSL in . . .