Linux Network Security - Page 42

Discover Network Security News

Can spammers really exploit wireless networks?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A landmark case in America could prove it...A US citizen is thought to have become the first person to be accused of hacking a wireless network in order to send spam.Nicholas Tombros, 37, is charged under the US CAN-SPAM act, which aims to clamp down on unsolicited junk mail. . . .

Linux-based Wi-Fi hot spot on CD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ZoneCD uses a modified version of the Debian Linux distribution called Koppix, which is designed to run from CD and provides automatic hardware detection and configuration. On top of this platform, Public IP provides features needed to run a secure Wi-Fi public hot spot, such as user authentication, a proxy server, content filtering, DNS caching and DHCP and Web server functionality. . . .

Engage Wardrive Scottie!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Throughout the underground internet the last few months, everyone has been whispering the same magic word: `wardrive'. No, not warp-drive, like in the Star-Trek series, the `engine' that allows to travel faster than the speed of light. Wardrive. The term was coined by Peter Shipley, a US internet guru. It means looking around (driving) for wireless networks (war). . . .

The 64-Bit Question

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sixty-four-bit computing systems are poised to remake the enterprise network, offering dramatic increases in performance and scalability by virtue of faster computing speeds and increased memory. And it's none too soon, as the deployment . . .

Wi-Fi group backs brawnier security standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Wi-Fi Alliance says WPA2 is a big improvement on earlier wireless security standards, such as Wired Equivalent Privacy (WEP), which hackers have found easy to circumvent. It includes Advanced Encryption Standard, which supports 128-bit, 192-bit and 256-bit keys . . .

GOP Conventioneers Fail to Lock Down Wireless

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Republicans and Democrats may hold to different ideologies, but they're pretty much the same -- lame -- when it comes to locking down wireless, a Boston-area firm said Thursday.As it did in late July when the Democrats held their convention in Boston, Newbury Networks, a provider of location-based wireless security solutions, conducted a "wardrive" around Madison Square Garden, the site of the Republican National Convention that wraps up today. . . .

How To Spam-Proof Your Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Because the Internet is open to the world, a network left unprotected to spam is a houseboat with the basement door left open.Spam accounted for 64 percent of the e-mail messages processed by Brightmail in May . . .

SSH Bouncing - How to get through firewalls easily.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Have you ever been in the situation that you wanted to SSH directly to a machine, but there has been some device in between that prevents it? Say you have a Linux firewall that protects your DMZ, and you have a boatload of machines behind it that you want to manage. There are all sorts of methods that are used to do so, and all have some level of annoyance. . . .

When Do We Start Slurping SIP?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Imagine if your Voice over IP (VoIP) (define) phone administration was as easy as using the Web. No more dropped connections, insecure sessions, lack of integration, or dependence on one vendor for systems. With Session Initiation Protocol (SIP), the long awaited promise of unified messaging may finally come true. No, SIP is not the latest in silly soft drinks; it is the latest . . .

For GOP, Wireless Is MIA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For their convention, the Republican Party eschewed Wi-Fi wireless networks in favor of 40,000 miles of cables that feed phones, high-speed Internet connections, and broadcast circuits. . . .

FCC Asks Supreme Court To Rule on Broadband

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"A successful appeal of this case would ultimately mean lower prices and better service for American consumers," said FCC Chairman Michael Powell. But Mark Cooper of the Consumer Federation of America said the FCC's move marked "another dark day for competition and consumers in one of the most vital sectors of our economy." . . .

Cisco Gear Subject to DoS Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco Systems on Friday warned that a denial of service (DoS) vulnerability exists for its products.The threat affects all Cisco products running the vendor's Internetwork Operating System (IOS). A DoS attack can be triggered if a hacker crafts a malicious TCP connection to a Telnet or reverse Telnet port of a Cisco device running IOS, according to a security advisory issued by Cisco, San Jose, Calif. . . .

HP Writes 'Good Worm'?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Opinion: No, it's not a worm, but HP's Active Countermeasures uses wormlike techniques to find and secure vulnerable systems. Although we shouldn't be afraid, it needs to be used judiciously. . . .

Security worries back to 2001 levels

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The severity and number of exploits and vulnerabilities in computer systems are causing greater concern for IT directors.In the wake of a report by outsourcing company Synstar, concerns over security are back to 2001 levels with nearly 90% of respondents more concerned about flaws and attacks than other IT issues. . . .

Securing Web services: Be your own CA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article we continue our discussion of some of the foundations of public key infrastructure (PKI) that we began in an earlier article, where we discussed the role of keys, certificates, and trust. While discussing the importance of distributed (or transitive) trust in PKI design, we outlined the job of the certificate authority (CA) in PKI, giving the general idea of its role in certificate issuance and management. Here, we'll explore the how and when one might wish to establish one's own CA when incorporating a PKI into an enterprise design. . . .

Defending The Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The DTI Information Security Breaches Survey 2004 (ISBS) is the UK's leading source of information on security incidents suffered by businesses, both large and small. One of the most surprising statistics to emerge from this year's DTI survey is that 7% of UK organizations are yet to implement any form of anti-virus software. Almost equally disconcerting is the fact that 41% of businesses do not immediately update their anti-virus software when a new virus signature is identified. . . .

Vulnerability Protection: A Buffer for Patching

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The purpose of this paper is to identify the problem facing the network security community regarding vulnerabilities and patches. It explains why current security technologies such as firewalls, intrusion detection and prevention systems, and automated patch management solutions have failed in preventing vulnerabilities from being exploited. Finally an alternative approach is proposed that incorporates and builds upon existing security technologies. . . .

No Easy Fix for Internal Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Not too long ago, the Gartner Group raised a minor dustup in the IT community by releasing a report claiming that portable storage media--including consumer devices such as cameras and MP3 players with built-in or removable memory--represent a new security threat to corporate networks. . . .

Big Brother's Last Mile

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On August 9th, 2004, the U.S. Federal Communications Commission (FCC) took a major step toward mandating the creation and implementation of new Internet Protocol standards to make all Internet communications less safe and less secure. What is even worse, the FCC's ruling will force ISP's and others to pay what may amount to billions of dollars to ensure that IP traffic remains insecure. . . .