Similar Articles |
|
Linux Journal October 1, 2002 Mick Bauer |
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
CIO September 15, 2002 D.F. Tweney |
Who's on Your Network? Intrusion detection systems can work, but they require time and money |
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
PC World March 11, 2001 |
Top 5 Firewall Utilities Protect your PC from suspicious activity on your network or the Internet... |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
PC Magazine March 2, 2004 Davis D. Janowski |
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. |
InternetNews October 20, 2005 Sean Michael Kerner |
Snort's Intrusion System Blows a Hole US-CERT issued an advisory this week warning that the open source Snort intrusion detection system had a highly critical buffer overflow vulnerability that could allow an attacker to execute arbitrary code. |
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
RootPrompt.org June 7, 2000 Lance Spitzner |
Know Your Enemy: A Forensic Analysis A study of an attack on a system. Instead of focusing on the tools and tactics used, he focuses on how he learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn the threats your organization faces... |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
PC Magazine August 3, 2004 |
Keep Your PC Safe Learn to wield your firewall, antivirus, and antispyware tools expertly; don't give up your PC without a fight. |
Linux Journal April 1, 2007 Mick Bauer |
Paranoid Penguin - Linux Firewalls for Everyone Need a personal firewall, an enterprise Internet gateway or something in between? iptables does it all! |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
Linux Journal June 1, 2002 David A. Bandel |
Kernel Korner: A NATural Progression A look at network address translation and how to avoid common errors when constructing iptables rules... |
RootPrompt.org April 10, 2000 Lance Spitzner |
Auditing Your Firewall How to Audit Your Firewall Setup. |
RootPrompt.org September 11, 2000 |
They Can't Crack What They Can't Find By using the firewalling tools built into the Linux kernel it is possible to make a desktop machine virtually disappear from the crackers' view... |
PC Magazine October 28, 2003 Brett Glass |
Batten Down Those Ports Don't let malicious intruders find a way into your system. We tell you how they try to sneak in -- and how to keep them out. |
InternetNews October 31, 2005 Jim Wagner |
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. |
Linux Journal March 2000 Jeff Regan |
An Introduction to Using Linux as a Multipurpose Firewall Feeling insecure? Here's a guide for getting the protection you need. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
Linux Journal December 12, 2006 Dempster & Eaton-Lee |
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. |
InternetNews December 12, 2005 Jim Wagner |
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. |
PC Magazine October 1, 2004 Neil J. Rubenking |
Personal Firewall--Don't Surf Without It To gauge the effectiveness of two popular firewall packages, we took the gloves off and attacked the firewall process using techniques available to a malicious program. McAfee Personal Firewall Plus 6.0... Norton Personal Firewall 2005... |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
Macworld May 22, 2006 Jeffery Battersby |
IPNetSentryX Powerful intrusion detector for experts only |
Military & Aerospace Electronics March 2005 John McHale |
Intrusion secures status for U.S. Army at Fort Huachuca Officials at Intrusion completed a yearlong information security project with the U.S. Army's Directorate of Information Management Fort Huachuca, Ariz. |
Linux Journal February 1, 2002 Gianluca Insolvibile |
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
InternetNews March 7, 2005 Sean Michael Kerner |
'Land' Bug Back to Bedevil Microsoft Servers Windows Server 2003 and XP SP2 machines without properly configured firewalls are at risk of a Denial of Service attack via the "LAND" bug, according to a security researcher. |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
InternetNews July 28, 2010 |
Sourcefire Debuts Integrated Security Tool New open source Razorback framework aims to give security professionals a unified view of the assets across the enterprise, amassing and correlating data from an array of points on the network. |
InternetNews April 20, 2004 Michael Singer |
Flaw Puts TCP Data Transfer At Risk Officials say systems that rely on persistent TCP connections, such as routers supporting BGP, could be affected. |
PC World July 29, 2002 Sam Costello |
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. |
PC Magazine December 20, 2006 |
Should I "Stealth" This Port? The open port 443 on a router is used to access secure websites, so keep it available. |
InternetNews June 26, 2009 Sean Michael Kerner |
Sourcefire Snorts Virtual Security New Sourcefire release takes aim at securing virtual environment both physically and virtually. |
PC World November 2003 Andrew Brandt |
Privacy Watch: Make Sure Your Firewall Is Sturdy Test your firewall to find out if it has any holes -- and then plug them up. |
CIO March 15, 2003 Christopher Koch |
Making Open Source Pay -- A Developer's Dilemma Even the companies that have managed to successfully sell themselves as service and support providers for open source have struggled to find a winning business model. |