Blog Posts Tagged with "Routers"


Is Hiding the Wireless SSID All the Network Security You Need?

June 20, 2012 Added by:Dale Rapp

The bad guy doesn't need to know if a wireless network is hidden or connected to the network to capture unencrypted traffic, and this unencrypted traffic could be divulging emails you send, web sites you visit, and passwords you type into log in pages. Encryption should always be used...

Comments  (3)


On Network Segmentation Faults

April 10, 2012 Added by:Jack Daniel

Why should you segment? Network and systems management can be enhanced by segmentation and isolation, as can performance- patch and systems management servers, departmental servers, printers and more can be placed in the most advantageous segment of the network...

Comments  (0)


Prevent VoIP Toll Fraud with Proper Configurations

February 22, 2012 Added by:Enno Rey

Unfortunately the attacker was able to circumvent our first workaround. We discovered that it was possible to “dial-in” to the router directly by calling the head number. As a long-term solution the configured dial patterns have to be modified to prevent such things in the future...

Comments  (0)


Black Hat OSPF Vulnerabilities: Much Ado about Nothing

August 11, 2011 Added by:Stefan Fouant

There is some merit to what these researchers have found and to a protocol junkie like myself. However, what they've completely overlooked is the first tenet of information security which is to ensure the physical environment is properly secured...

Comments  (0)


AAA Security Troubleshooting

June 27, 2011 Added by:Dawn Hopper

In troubleshooting authentication, using specific debug tacacs+ or debug radius commands often provide too detailed and obscure output to anyone except those extremely knowledgeable in the protocols. Instead, the debug AAA authentication generic command has several advantages...

Comments  (0)


Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)


The History Behind EIGRP

April 22, 2011 Added by:Global Knowledge

IGRP scales better than RIP, as internetworks continued to grow in size a D-V protocol such as IGRP required excessive amounts of router CPU power and link bandwidth to support periodic advertisements. To overcome these limitations, EIGRP was developed...

Comments  (0)


Examining Theoretical Attacks on the Internet's Core

March 16, 2011 Added by:Headlines

Security researchers came up with what they called Coordinated Cross Plane Session Termination (CXPST), a form of DDoS attack designed to cause wide-scale disruption to Internet traffic. CXPST targets core routers, the main super-high-end devices responsible for pumping data around the Internet...

Comments  (0)


Cyber Weapon Capable of Crashing the Internet?

February 23, 2011 Added by:Dan Dieterle

In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...

Comments  (2)


Implementing Bidirectional Forwarding Detection

January 13, 2011 Added by:Stefan Fouant

Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...

Comments  (0)


Making the Network Secure in 2011

December 25, 2010 Added by:Simon Heron

IT managers are right to be wary of new threats like viruses coming in on infected devices such as USB sticks (like Stuxnet) or mobile devices, which pose an increasing threat. However there is a more pressing threat to network security...

Comments  (0)