Linux Network Security - Page 40

Discover Network Security News

Microsoft, Cisco To Share Network Security Technologies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The goal is a "single, coordinated solution" that enables network administrators to control both Windows installations and Cisco network architecture, the two tech giants said. The companies will also strive to draft and have implemented industry standards for network admissions and access control. . . .

ZoneMinder: Linux Home Security Par Excellence

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I recently installed a remote home camera security system using wireless Internet cameras and a fine free software application for Linux called ZoneMinder. The cameras are installed at a friend's house, and the application runs at mine. ZoneMinder is powerful, feature-rich, and sophisticated. . . .

E-commerce most-targeted for attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

CYBER attackers are launching more sophisticated attacks for financial gain with exploits that are being created easier and faster than ever before, and their single biggest target is e-commerce. . . .

Why Snort, Nessus, OSS build secure IT fortresses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's no way that Todd Sanders would ever think of building network security and monitoring applications for businesses without using open source tools. Besides being free or inexpensive, open source tools such as Snort, Nessus and F-protect have worked better than proprietary alternatives. . . .

Drive-by hackers get residents' hackles up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The specter of drive-by computer hackers cruising upscale Scottsdale neighborhoods to cherry-pick wireless Web systems has residents worried about a new method of privacy intrusion and identity theft. Residents of Scottsdale's Stonegate neighborhood filed a police report after their home computers were accessed by so-called "wardrivers," computer hackers who detect unprotected wireless Internet connections. . . .

Protecting the Perimeter With OpenBSD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Unix operating system has so many descendants and variations that organizations navigating the maze of choices can quickly become disoriented. Many of these projects were launched to offer operating systems unencumbered by the commercial and proprietary licenses tied to the original AT&T UNIX. . . .

Authorize.Net Battles Extortion Attempts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Corey Mandell knew things weren't good when he got the ransom letter. Mandell had experienced such things before, and he knew that Authorize.Net, a Bellevue, Wash., credit card processing company, would be in for a tough time. What he didn't realize until later is that it would be much worse than he had anticipated. . . .

Defending Your IT Infrastructure Through Effective Patch Management

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. While driving into the office, half-listening to the radio news, you hear your bank's name being announced, immediately followed by the words "hacker", "massive system failure" and "identity theft". . . .

IP Telephony Changes Security Equation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SEPTEMBER 27, 2004 (COMPUTERWORLD) - In an effort to cut costs, my company has decided to migrate from private branch exchanges to IP telephony. By routing calls over our existing IP network and using voice-over-IP links, we can significantly cut our telecommunications costs, especially since we have significant telephone traffic between our U.S. offices and places like Europe and India, as well as other parts of Asia. . . .

WLAN Security Still A Stumbling Block

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Employees are increasingly demanding that enterprises deploy wireless LANs (WLAN). While many companies are acceding to their demands, security issues are the main factor inhibiting even faster uptake of the technology. . . .

'Net Attacks Down, Bot Networks Up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The average daily volume of Internet attacks declined in the last six months, according to Symantec Corp.'s Internet Security Threat Report. Released last week, the report is a snapshot of security events derived from monitoring 20,000 security devices. . . .