• Main Menu
  • Network Security

    • Firewalls

      Firewalls

      A firewall is a software component that restricts unauthorized inward network access. It allows outward information flow. It is set up to control traffic flow between two networks by configured permissions like Allow, Deny, Block, Encrypt, etc. It is normally employed to avoid illegal access to personal computers or corporate networks from external unsafe entities

    • How Firewall Protection Works

      How Firewall Protection Works

      Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • Single Sign-On

      Single Sign-On

      Single Sign-On is a concept that allows an end-user to access multiple, related but independent, software applications using a single account. That is, an end-user logs into his/her account only once and then access multiple applications without needing to login again. Single Sign-On is often abbreviated SSO. One the same line, Single Sign-Off is a

    • DMZ (DeMilitarized Zone)

      DMZ (DeMilitarized Zone)

      The majority of non-computer professionals think of a DMZ as the strip of land that serves as the buffer between North and South Korea along the 39th parallel north created as part of the Korean Armistice Agreement in 1953. In the computer security field; however, the DMZ (Demilitarized Zone) is either a logical or physical

    • How to Disable the Netgear Router Firewall

      How to Disable the Netgear Router Firewall

      In most cases, disabling the firewall on a Netgear router is a really bad idea. In fact, it is such a bad idea that Netgear does not even make a button in their GUI that does this. Nevertheless, users can effectively disable a Netgear router firewall just by adding a rule or two to the

    • Network Attacks

      Network Attacks

      Understanding Network Attacks A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security. There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few

    • IKE (Internet Key Exchange)

      IKE (Internet Key Exchange)

      The term Internet Key Exchange refers to the networking protocol that designed to configure a SA (security association) within the IPsec protocol suite of applications. Internet Key Exchange (or IKE) is constructed on top of ISAKMP and the Oakley protocol and is often used in the VPN tunneling process. X.509 certificates are used for authentication

    • How to Monitor Wireless Traffic

      How to Monitor Wireless Traffic

      Wireless traffic is considered to be those Internet protocol packets that are transmitted through an 802.11a, b, g, n, or i wireless protocol. Monitoring Requirements There are a few things to consider when planning to setup wireless traffic monitoring. First, the user must determine what kind of traffic will be monitored. Is the traffic to

    • Intrusion Detection System (IDS)

      Intrusion Detection System (IDS)

      Consumers commonly mistake an intrusion detection system (IDS)with a computer firewall. Although both applications have a similar goal to protect end-users from nefarious hackers and computer malware, an IDS differs from a firewall in that it can be either a device or software program created to monitor an individual computer, computing device, or network for

    network-security
    204 queries in 0.542 seconds.