Linux Network Security - Page 86

Discover Network Security News

Linux 101: Basic network security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is a nice little that can help you get started in security. "Linux security can be as simple or as advanced as you want. A Linux system can be locked down (relatively speaking) with a simple one-two punch of . . .

NSI's Webjacking Epidemic

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last weekend, a thief armed with nothing more than a fax machine and a piece of paper made off with the whole enterprise. "It appears some forged documents were sent via fax to Network Solutions indicating that the domains should be transferred to someone in Canada," Meckler said.

Is Linux a net security risk?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A SANS Institute of America report has named Linux and Unix operated sites as more vulnerable to internet attacks than Windows and Mac powered sites. Compiled by US industry, government, and academics, the June 1 paper, titled How to Eliminate the Ten Most Critical Internet Security Threats: The Experts' Consensus, names versions of Unix and Linux systems in nine out of a "top ten" list of security vulnerabilities for operating systems that engineers "need to eliminate". Dean Stockwell, director of sales and support, Network Associates Asia-Pacific, dismissed SANS's report as "skewed".

Security Firm to List Additional Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The threats listed in the document are just the "tip on the iceberg," Nowland said, warning network administrators not to feel safe simply because they address the 10 concerns outlined by SANS. NETSEC intends next week to release its . . .

Crackers use search engines to exploit weak sites

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"... With a bit of ingenuity, anyone can skirt basic password authentication and go straight to the goodies on those sites where administrators are foolish enough to post them. If the desired information is contained in a Web page, anyone . . .

Hacking Away at Government

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"In the race to get online, network security has been something of an afterthought. But even the most obscure agency can be a target for Internet intruders. .. According to records on Web site defacements kept by attrition.org, a hacking . . .

IT, Company Execs Add To Security Holes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The SANS threat list has become the focus this week. "The majority of successful attacks on computer systems via the Internet can be traced to exploitation of one of a small number of security flaws, SANS said. Most . . .

Hackers' favorite security holes revealed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

More on the recent SANS report. ""Many of the vulnerabilities on that list are well-known vulnerabilities that everyone knows about," said Sean Hernan, team leader for vulnerability handling at the Computer Emergency Response Team (CERT) Coordination Center at Carnegie . . .

TACACS+ Analysis

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

TACACS+ is a protocol used to provide access control for routers and network devices created by Cisco. Solar found a buffer overflow and reported it and supplied a patch in the report below. Cisco later responded to . . .

Nmap 2.53 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The latest version of nmap, a utility for port scanning networks, has been released. This tool should be in everyone's security arsenal. "The main addition is IP Protocol scan mode (-sO) which tells you what protocols the host . . .

The Shell Game

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article explains the need and rationale for Secure SHell, an encrypted communications channel which functions as a telnet replacement, and also guides you through the process of installing and using SSH on your own system. . . .

Spring cleaning tips for managers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If your agency deals in classified or sensitive information, you probably wage an ongoing war against Internet hackers. The danger isn’t so much from hackers’ creativity as much as it’s due to managers’ failures to seal security holes, establish policies . . .

Can IPv6 replace SSL?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Reto Haeni has written this paper that gives a brief overview of the features of IPv6 and discuss its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available . . .

Secure Web-2-WAP File Transfers now Possible

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Accessing the Web using WAP (Wireless Application Protocol)-enabled mobile phones may be all the rage, but what about the security issues? While it is possible to encrypt selected sections of the Web using a desktop PC with conventional browser and . . .

Warning: Wireless Traffic Jams Loom

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The spectrum used by the LANs' signals is expected to become crowded so quickly that companies could find themselves replacing all of their wireless equipment in just two to three years, as wireless technology is forced to move to less . . .