Linux Network Security - Page 42

Discover Network Security News

Perimeter security is changing fast

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep "bad" things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user. . . .

Boingo Bolsters Hotspot Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Boingo Wireless said Wednesday that it has added 802.1x and WPA security support to its network of hotspots.Specifically, the hotspot vendor said it has released new end user client software that incorporates support for 802.1x and WPA security measures. . . .

Can spammers really exploit wireless networks?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A landmark case in America could prove it...A US citizen is thought to have become the first person to be accused of hacking a wireless network in order to send spam.Nicholas Tombros, 37, is charged under the US CAN-SPAM act, which aims to clamp down on unsolicited junk mail. . . .

Linux-based Wi-Fi hot spot on CD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ZoneCD uses a modified version of the Debian Linux distribution called Koppix, which is designed to run from CD and provides automatic hardware detection and configuration. On top of this platform, Public IP provides features needed to run a secure Wi-Fi public hot spot, such as user authentication, a proxy server, content filtering, DNS caching and DHCP and Web server functionality. . . .

Engage Wardrive Scottie!

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Throughout the underground internet the last few months, everyone has been whispering the same magic word: `wardrive'. No, not warp-drive, like in the Star-Trek series, the `engine' that allows to travel faster than the speed of light. Wardrive. The term was coined by Peter Shipley, a US internet guru. It means looking around (driving) for wireless networks (war). . . .

The 64-Bit Question

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sixty-four-bit computing systems are poised to remake the enterprise network, offering dramatic increases in performance and scalability by virtue of faster computing speeds and increased memory. And it's none too soon, as the deployment . . .

Wi-Fi group backs brawnier security standard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Wi-Fi Alliance says WPA2 is a big improvement on earlier wireless security standards, such as Wired Equivalent Privacy (WEP), which hackers have found easy to circumvent. It includes Advanced Encryption Standard, which supports 128-bit, 192-bit and 256-bit keys . . .

GOP Conventioneers Fail to Lock Down Wireless

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Republicans and Democrats may hold to different ideologies, but they're pretty much the same -- lame -- when it comes to locking down wireless, a Boston-area firm said Thursday.As it did in late July when the Democrats held their convention in Boston, Newbury Networks, a provider of location-based wireless security solutions, conducted a "wardrive" around Madison Square Garden, the site of the Republican National Convention that wraps up today. . . .

How To Spam-Proof Your Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Because the Internet is open to the world, a network left unprotected to spam is a houseboat with the basement door left open.Spam accounted for 64 percent of the e-mail messages processed by Brightmail in May . . .

SSH Bouncing - How to get through firewalls easily.

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Have you ever been in the situation that you wanted to SSH directly to a machine, but there has been some device in between that prevents it? Say you have a Linux firewall that protects your DMZ, and you have a boatload of machines behind it that you want to manage. There are all sorts of methods that are used to do so, and all have some level of annoyance. . . .

When Do We Start Slurping SIP?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Imagine if your Voice over IP (VoIP) (define) phone administration was as easy as using the Web. No more dropped connections, insecure sessions, lack of integration, or dependence on one vendor for systems. With Session Initiation Protocol (SIP), the long awaited promise of unified messaging may finally come true. No, SIP is not the latest in silly soft drinks; it is the latest . . .

For GOP, Wireless Is MIA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For their convention, the Republican Party eschewed Wi-Fi wireless networks in favor of 40,000 miles of cables that feed phones, high-speed Internet connections, and broadcast circuits. . . .

FCC Asks Supreme Court To Rule on Broadband

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"A successful appeal of this case would ultimately mean lower prices and better service for American consumers," said FCC Chairman Michael Powell. But Mark Cooper of the Consumer Federation of America said the FCC's move marked "another dark day for competition and consumers in one of the most vital sectors of our economy." . . .

Cisco Gear Subject to DoS Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco Systems on Friday warned that a denial of service (DoS) vulnerability exists for its products.The threat affects all Cisco products running the vendor's Internetwork Operating System (IOS). A DoS attack can be triggered if a hacker crafts a malicious TCP connection to a Telnet or reverse Telnet port of a Cisco device running IOS, according to a security advisory issued by Cisco, San Jose, Calif. . . .

HP Writes 'Good Worm'?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Opinion: No, it's not a worm, but HP's Active Countermeasures uses wormlike techniques to find and secure vulnerable systems. Although we shouldn't be afraid, it needs to be used judiciously. . . .

Security worries back to 2001 levels

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The severity and number of exploits and vulnerabilities in computer systems are causing greater concern for IT directors.In the wake of a report by outsourcing company Synstar, concerns over security are back to 2001 levels with nearly 90% of respondents more concerned about flaws and attacks than other IT issues. . . .

Securing Web services: Be your own CA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article we continue our discussion of some of the foundations of public key infrastructure (PKI) that we began in an earlier article, where we discussed the role of keys, certificates, and trust. While discussing the importance of distributed (or transitive) trust in PKI design, we outlined the job of the certificate authority (CA) in PKI, giving the general idea of its role in certificate issuance and management. Here, we'll explore the how and when one might wish to establish one's own CA when incorporating a PKI into an enterprise design. . . .

Defending The Network

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The DTI Information Security Breaches Survey 2004 (ISBS) is the UK's leading source of information on security incidents suffered by businesses, both large and small. One of the most surprising statistics to emerge from this year's DTI survey is that 7% of UK organizations are yet to implement any form of anti-virus software. Almost equally disconcerting is the fact that 41% of businesses do not immediately update their anti-virus software when a new virus signature is identified. . . .