Blog Posts Tagged with "Routers"

964eef19f95b77a2606d36daf6deb25f

Is Hiding the Wireless SSID All the Network Security You Need?

June 20, 2012 Added by:Dale Rapp

The bad guy doesn't need to know if a wireless network is hidden or connected to the network to capture unencrypted traffic, and this unencrypted traffic could be divulging emails you send, web sites you visit, and passwords you type into log in pages. Encryption should always be used...

Comments  (3)

B8db824b8b275afb1f4160f03cd3f733

On Network Segmentation Faults

April 10, 2012 Added by:Jack Daniel

Why should you segment? Network and systems management can be enhanced by segmentation and isolation, as can performance- patch and systems management servers, departmental servers, printers and more can be placed in the most advantageous segment of the network...

Comments  (0)

0f57a863af3b7e5bf59a94319a408ff7

Prevent VoIP Toll Fraud with Proper Configurations

February 22, 2012 Added by:Enno Rey

Unfortunately the attacker was able to circumvent our first workaround. We discovered that it was possible to “dial-in” to the router directly by calling the head number. As a long-term solution the configured dial patterns have to be modified to prevent such things in the future...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Black Hat OSPF Vulnerabilities: Much Ado about Nothing

August 11, 2011 Added by:Stefan Fouant

There is some merit to what these researchers have found and to a protocol junkie like myself. However, what they've completely overlooked is the first tenet of information security which is to ensure the physical environment is properly secured...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

AAA Security Troubleshooting

June 27, 2011 Added by:Dawn Hopper

In troubleshooting authentication, using specific debug tacacs+ or debug radius commands often provide too detailed and obscure output to anyone except those extremely knowledgeable in the protocols. Instead, the debug AAA authentication generic command has several advantages...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The History Behind EIGRP

April 22, 2011 Added by:Global Knowledge

IGRP scales better than RIP, as internetworks continued to grow in size a D-V protocol such as IGRP required excessive amounts of router CPU power and link bandwidth to support periodic advertisements. To overcome these limitations, EIGRP was developed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Examining Theoretical Attacks on the Internet's Core

March 16, 2011 Added by:Headlines

Security researchers came up with what they called Coordinated Cross Plane Session Termination (CXPST), a form of DDoS attack designed to cause wide-scale disruption to Internet traffic. CXPST targets core routers, the main super-high-end devices responsible for pumping data around the Internet...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Cyber Weapon Capable of Crashing the Internet?

February 23, 2011 Added by:Dan Dieterle

In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...

Comments  (2)

065b7cfbbb03ac9d18cbf5ed0615b40a

Implementing Bidirectional Forwarding Detection

January 13, 2011 Added by:Stefan Fouant

Essentially, at the root of the problem is either a lack of suitable protocols for fast failure detection of lower layers, or worse, no protocol at all. The solution to this was the development of Bidirectional Forwarding Detection, or BFD...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Making the Network Secure in 2011

December 25, 2010 Added by:Simon Heron

IT managers are right to be wary of new threats like viruses coming in on infected devices such as USB sticks (like Stuxnet) or mobile devices, which pose an increasing threat. However there is a more pressing threat to network security...

Comments  (0)