• Main Menu
  • Network Security

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • Responding to Network Attacks and Security Incidents

      Responding to Network Attacks and Security Incidents

      Network Attacks Review A network attack occurs when an attacker or hacker uses certain methods or technologies to maliciously attempt to compromise the security of a network. Hackers attack corporate networks to use data for financial gain or for industrial espionage, to illegally use user accounts and privileges, to run code to damage and corrupt

    • LDAP Security Issues

      LDAP Security Issues

      RFC 2829 – Authentication Methods for LDAP defines the basic threats to an LDAP directory service: Unauthorized access to data via data-fetching operations, Unauthorized access to reusable client authentication information by monitoring others' access, Unauthorized access to data by monitoring others' access, Unauthorized modification of data, Unauthorized modification of configuration, Unauthorized or excessive use of

    • DMZ (DeMilitarized Zone)

      DMZ (DeMilitarized Zone)

      The majority of non-computer professionals think of a DMZ as the strip of land that serves as the buffer between North and South Korea along the 39th parallel north created as part of the Korean Armistice Agreement in 1953. In the computer security field; however, the DMZ (Demilitarized Zone) is either a logical or physical

    • Single Sign-On

      Single Sign-On

      Single Sign-On is a concept that allows an end-user to access multiple, related but independent, software applications using a single account. That is, an end-user logs into his/her account only once and then access multiple applications without needing to login again. Single Sign-On is often abbreviated SSO. One the same line, Single Sign-Off is a

    • Cyber Warfare

      Cyber Warfare

      Cyber warfare refers to a massively coordinated digital assault on a government by another, or by large groups of citizens. Estonia was subject to this kind of attack in 2006. The conflict apparently stemmed from a decision by the Estonian government to move a Soviet-era monument to another location, an action resented and protested against

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    • IKE (Internet Key Exchange)

      IKE (Internet Key Exchange)

      The term Internet Key Exchange refers to the networking protocol that designed to configure a SA (security association) within the IPsec protocol suite of applications. Internet Key Exchange (or IKE) is constructed on top of ISAKMP and the Oakley protocol and is often used in the VPN tunneling process. X.509 certificates are used for authentication

    • How Firewall Protection Works

      How Firewall Protection Works

      Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port

    • Peer Guardian

      Peer Guardian

      Peer Guardian is perhaps the most popular IP blocking software tool on the web. The Peer2Peer sharing community primarily uses Peer Guardian to block the RIAA, MPAA, and other organizations from tracking a sharer’s IP address and online activity. In addition to blocking IP addresses, Peer Guardian also blocks adware, spyware, and government and educational

    network-security
    } 215 queries in 0.424 seconds.