Similar Articles |
|
Unix Insider December 2000 Sandra Henry-Stocker |
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
PC Magazine December 20, 2006 |
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
InternetNews December 9, 2005 Sean Michael Kerner |
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |
PC Magazine June 22, 2005 Larry Seltzer |
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. |
PC Magazine October 28, 2003 Brett Glass |
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
PC Magazine August 19, 2003 Dennis Fisher |
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
Unix Insider October 2000 Sandra Henry-Stocker |
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... |
PC Magazine February 2, 2005 Robert P. Lipschutz |
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. |
PC Magazine August 3, 2005 Ryan Naraine |
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. |
RootPrompt.org September 7, 2000 Sander Plomp |
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. |
InternetNews January 5, 2005 Sean Michael Kerner |
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. |
RootPrompt.org May 22, 2000 Noel |
Cracked! Part 3: Hunting the Hunter Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about some of the efforts made to track down the cracker and some surprises.... |
InternetNews February 19, 2008 Andy Patrizio |
SonicWall Firewalls Boast Increased Throughput Firewall vendor SonicWall today introduced the SonicWall Network Security Appliance Series, a trio of multifunction firewalls aimed at the mid-enterprise. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |
PC World May 2005 Lincoln Spector |
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. |
PC World January 2001 Alan Stafford |
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... |
PC Magazine September 21, 2004 |
NAT Enough? A home router is not a complete security solution. |
PC World May 2001 Scott Spanbauer |
Hunt Down Those Hackers and ... Ignore Them? Uncover possible hackers... customize IE's title bar... install Winamp... |
PC World December 2003 Scott Spanbauer |
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. |
PC World June 2004 Mary Landesman |
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. |
PC Magazine June 23, 2008 Matthew D. Sarrel |
How Secure Is Your Company? To protect your business, think like a thief. |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
Macworld August 2004 Douglas Heestand |
IPNetMonitorX 1.4 This all-purpose tool for troubleshooting network connections adds power to OS X's Free Tools, especially if you spend a lot of time troubleshooting network connections. |
InternetNews August 30, 2004 Ryan Naraine |
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. |
InternetNews March 7, 2005 Sean Michael Kerner |
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. |
InternetNews April 20, 2004 Michael Singer |
Flaw Puts TCP Data Transfer At Risk Officials say systems that rely on persistent TCP connections, such as routers supporting BGP, could be affected. |
InternetNews November 17, 2006 Gene Hirschel |
Net Neutrality? Not at MSN! Whatever happened to free access to e-mail, one of the foundations of the Internet? |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
InternetNews April 27, 2011 |
Russia Leads in Internet Attack Traffic New report from Akamai names Russia as the source of 10 percent of global attack traffic, but is it all really coming from Russia? |
InternetNews October 14, 2005 Sean Michael Kerner |
Paul Kim, CTO, Stanford School of Education Another academic year is under way at Stanford University and with it comes new challenges for its IT enterprise. Key topics include the institution's policy on P2P, instant messaging, and security. |
Linux Journal December 12, 2006 Dempster & Eaton-Lee |
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. |
RootPrompt.org August 28, 2000 |
Security Etiquette So what is the proper etiquette for contacting the SysAdmin of a cracked box? |
PC Magazine February 2, 2005 Neil J. Rubenking |
Who's Scanning My Computer? I am always getting pop-ups stating that someone or something is trying to invade my computer. |
PC Magazine October 1, 2004 Neil J. Rubenking |
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... |