Gaining Access to a Check Point Appliance

February 07, 2012 Added by:Bill Mathews

On any Linux-based system with an unencrypted hard drive, it is possible to completely overtake a system once you have gained physical access. Often this is easily accomplished with a live CD distribution, such as Backtrack or Ubuntu and some command line tools...

Comments  (0)


Cybersecurity in Today's World

December 31, 2011 Added by:Larry Karisny

Curt Massey spent a 35-year career protecting our national security. His military service, civilian law enforcement, corporate security and military contracting experiences have imbued him with the unpleasant knowledge of our core vulnerabilities and a visceral drive to build a team capable of finding answers...

Comments  (0)


Common Errors in Firewall Configurations

December 06, 2011 Added by:Christopher Rodgers

With the "ANY" port accessible vulnerability, clear text protocols could be used when both a secure and less secure clear text service are running on the same system, and vulnerabilities found for specific services such as SMB could be launched against vulnerable machines...

Comments  (0)


Using the Shun Command on the PIX/ASA

May 18, 2011 Added by:Global Knowledge

One command that had a fairly long history first with the PIX Firewall and now the ASA is the shun command. In this post we’ll examine this command’s history, why it’s useful, and its new-found resurgence in threat detection implementation...

Comments  (1)


Analysis Shows Firewalls Fail to Deliver as Promised

April 12, 2011 Added by:Headlines

Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...

Comments  (2)


Web Proxies and NetBIOS Targeted by Hackers

September 03, 2010 Added by:Simon Heron

A high number of firewall blocks are coming from the US and Korea, and UDP:137, the name service of NetBIOS is the second most attacked port. There are obviously still systems out there with this port open to the internet. Our message to IT managers is check your firewall rules...

Comments  (4)


IT Marketing: There is No App for That

June 14, 2010 Added by:Mike Meikle

For the average information technology professional, the concept of marketing & selling is an alien skill set; like under-water bagpipe playing.  In the eye of the IT pro, this skill is composed mostly of excessive hair-gel, pointless presentations and flim-flam.

Comments  (0)


FortiGate signature for Mass Website Hack

June 11, 2010 Added by:Rod MacPherson

For users of FortiGate brand UTM firewalls I've put together a FortiGate IPS custom signature that should help by blocking/reporting on infected sites of the recent mass SQL Injection attacks. 

Comments  (0)


Critical Steps for Securing Layer Two

June 08, 2010 Added by:Global Knowledge

For many years, network administrators have expected security breaches to come from outside an organization or at the upper layers of the OSI model. For this purpose, firewalls are implemented at the edge of a network.While the default state of a firewall does not allow communication between an organization and networks beyond the organizational borders, routers and switches were desig...

Comments  (0)


Policing Dirty Networks & Applications - Using the OSI model to fault find network and applications

May 11, 2010 Added by:John England

I've just read a nice blog from Ray Tan on the importance of the OSI model, and how theory should map to practise. I for one am an advocate of this, and I thought I would share my little common sense system for logical fault finding based on a shortened version of the OSI model. One to share with the less enlightened!

Comments  (1)


Chisco: Welcome To The Hunan Network?

April 23, 2010 Added by:shawn merdinger

On NPR's 'Fresh Air' this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it's still a very real threat -- recall that Chisco devices were discovered on US government networks and disclosed back in 2008.

Comments  (0)


Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)


Hackers Lurking in Hotel Networks

March 17, 2010 Added by:Mark Smail

Many frequent business travelers spend almost as many nights sleeping in hotels as they do in their own beds. The need to stay productive when you’re on the road means that travelers must rely on whatever means available to stay connected, even if it’s an unprotected hotel wireless network.  

Comments  (3)

Page « < 17 - 18 - 19 - 20 - 21 > »
Most Liked