MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Unix Insider
December 2000
Sandra Henry-Stocker
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
RootPrompt.org
April 10, 2000
Lance Spitzner
Auditing Your Firewall How to Audit Your Firewall Setup. mark for My Articles similar articles
PC Magazine
December 20, 2006
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
InternetNews
December 9, 2005
Sean Michael Kerner
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
PC Magazine
June 22, 2005
Larry Seltzer
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. mark for My Articles similar articles
PC Magazine
October 28, 2003
Brett Glass
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. mark for My Articles similar articles
PC World
November 2003
Andrew Brandt
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. mark for My Articles similar articles
PC Magazine
August 19, 2003
Dennis Fisher
The Lookout: New Breed of Trojan Security researchers believe they have identified a new breed of Trojan horse that is infecting machines on the Internet, possibly in preparation for a larger coordinated attack. mark for My Articles similar articles
RootPrompt.org
May 7, 2001
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
PC Magazine
August 3, 2004
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
PC Magazine
August 3, 2005
Ryan Naraine
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. mark for My Articles similar articles
RootPrompt.org
September 7, 2000
Sander Plomp
Amateur Fortress Building in Linux Part 1 Sander Plomp is tired of articles telling you to edit inetd.conf. So he wrote this article that looks at how to turn your system into amateur fortress in some interesting ways. mark for My Articles similar articles
InternetNews
January 5, 2005
Sean Michael Kerner
Hackers After Patched WINS Servers According to the Internet Storm Center (ISC) at the SANS Institute, hackers are trying to exploit an already patched Microsoft WINS Server vulnerability. mark for My Articles similar articles
RootPrompt.org
May 22, 2000
Noel
Cracked! Part 3: Hunting the Hunter Noel continues the story of when some Unix boxes that he helped admin were cracked. This article talks about some of the efforts made to track down the cracker and some surprises.... mark for My Articles similar articles
InternetNews
February 19, 2008
Andy Patrizio
SonicWall Firewalls Boast Increased Throughput Firewall vendor SonicWall today introduced the SonicWall Network Security Appliance Series, a trio of multifunction firewalls aimed at the mid-enterprise. mark for My Articles similar articles
RootPrompt.org
September 11, 2000
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... mark for My Articles similar articles
Linux Journal
March 2000
Jeff Regan
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. mark for My Articles similar articles
PC World
March 11, 2001
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... mark for My Articles similar articles
PC World
May 2005
Lincoln Spector
Hide Your Internet Ports From Snooping Hackers Closing open ports... Turning off Windows new program notification... Printing fonts and saving paper... etc. mark for My Articles similar articles
PC World
January 2001
Alan Stafford
Warp Speed Web Access: Sharing the Bandwidth Broadband routers give your network a protected connection to the Internet... mark for My Articles similar articles
PC Magazine
September 21, 2004
NAT Enough? A home router is not a complete security solution. mark for My Articles similar articles
PC World
May 2001
Scott Spanbauer
Hunt Down Those Hackers and ... Ignore Them? Uncover possible hackers... customize IE's title bar... install Winamp... mark for My Articles similar articles
PC World
December 2003
Scott Spanbauer
Ultimate Network Security: How to Install a Firewall Everything you need to know about selecting and installing a firewall for your PC or network. mark for My Articles similar articles
PC World
June 2004
Mary Landesman
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. mark for My Articles similar articles
PC Magazine
June 23, 2008
Matthew D. Sarrel
How Secure Is Your Company? To protect your business, think like a thief. mark for My Articles similar articles
Linux Journal
April 1, 2007
Mick Bauer
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! mark for My Articles similar articles
Macworld
August 2004
Douglas Heestand
IPNetMonitorX 1.4 This all-purpose tool for troubleshooting network connections adds power to OS X's Free Tools, especially if you spend a lot of time troubleshooting network connections. mark for My Articles similar articles
InternetNews
August 30, 2004
Ryan Naraine
Cisco Confirms DoS Flaws Cisco's IOS-powered devices at risk of Denial of Service attacks. mark for My Articles similar articles
InternetNews
March 7, 2005
Sean Michael Kerner
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. mark for My Articles similar articles
InternetNews
April 20, 2004
Michael Singer
Flaw Puts TCP Data Transfer At Risk Officials say systems that rely on persistent TCP connections, such as routers supporting BGP, could be affected. mark for My Articles similar articles
InternetNews
November 17, 2006
Gene Hirschel
Net Neutrality? Not at MSN! Whatever happened to free access to e-mail, one of the foundations of the Internet? mark for My Articles similar articles
Macworld
May 2001
Mel Beckman
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... mark for My Articles similar articles
InternetNews
April 27, 2011
Russia Leads in Internet Attack Traffic New report from Akamai names Russia as the source of 10 percent of global attack traffic, but is it all really coming from Russia? mark for My Articles similar articles
InternetNews
October 14, 2005
Sean Michael Kerner
Paul Kim, CTO, Stanford School of Education Another academic year is under way at Stanford University and with it comes new challenges for its IT enterprise. Key topics include the institution's policy on P2P, instant messaging, and security. mark for My Articles similar articles
Linux Journal
December 12, 2006
Dempster & Eaton-Lee
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. mark for My Articles similar articles
RootPrompt.org
August 28, 2000
Security Etiquette So what is the proper etiquette for contacting the SysAdmin of a cracked box? mark for My Articles similar articles
PC Magazine
February 2, 2005
Neil J. Rubenking
Who's Scanning My Computer? I am always getting pop-ups stating that someone or something is trying to invade my computer. mark for My Articles similar articles
PC Magazine
October 1, 2004
Neil J. Rubenking
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... mark for My Articles similar articles