• Main Menu
  • Network Security

    • How Firewall Protection Works

      How Firewall Protection Works

      Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port

    • Packet Fragmentation

      Packet Fragmentation

      Every packet based network has an MTU (Maximum Transmission Unit) size. The MTU is the size of the largest packet that that network can transmit. Packets larger than the allowable MTU must be divided into smaller packets or fragments to enable them to traverse the network. Network Standard MTU Ethernet 1500 Token Ring 4096 Packet

    • Single Sign-On

      Single Sign-On

      Single Sign-On is a concept that allows an end-user to access multiple, related but independent, software applications using a single account. That is, an end-user logs into his/her account only once and then access multiple applications without needing to login again. Single Sign-On is often abbreviated SSO. One the same line, Single Sign-Off is a

    • RADIUS (Remote Authentication Dial in User Service)

      RADIUS (Remote Authentication Dial in User Service)

      RADIUS (Remote Authentication Dial In User Service), defined in RFC 2865, is a protocol for remote user authentication and accounting. RADIUS enables centralized management of authentication data, such as usernames and passwords. When a user attempts to login to a RADIUS client, such as a router, the router send the authentication request to the RADIUS

    • Free Firewall Software

      Free Firewall Software

      Free firewalls have become very common and represent an excellent alternative to commercial firewall packages. Most of these firewalls run under some form of Linux, FreeBSD, or OpenBSD. Many of these free firewalls are front-ends for the lower-level firewall packages which ship with these operating systems, such as pf (Packet Filter), ipf (IPFilter), ipfw (IPFirewall),

    • IPsec

      IPsec

      IPSec (IP Security) is a suite of protocols which was designed by Internet Engineering Task Force (IETF) to protect data by signing and encrypting data before it is transmitted over public networks. The IETF Request for Comments (RFCs) 2401-2409 defines the IPSec protocols with regard to security protocols, security associations and key management, and authentication

    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • What Are the Effects of Computer Hacking?

      What Are the Effects of Computer Hacking?

      Hacking as a Destructive Tool The common stance on hacking with the average person is that it is morally wrong. There have been several instances where hacking has proven to have caused problems. Hacking can create a variety of damages to people, groups and systems of broad spectrum. Negative Hacking Interactions: Identity Theft – Some hackers can

    • IKE (Internet Key Exchange)

      IKE (Internet Key Exchange)

      The term Internet Key Exchange refers to the networking protocol that designed to configure a SA (security association) within the IPsec protocol suite of applications. Internet Key Exchange (or IKE) is constructed on top of ISAKMP and the Oakley protocol and is often used in the VPN tunneling process. X.509 certificates are used for authentication

    • Firewalls

      Firewalls

      A firewall is a software component that restricts unauthorized inward network access. It allows outward information flow. It is set up to control traffic flow between two networks by configured permissions like Allow, Deny, Block, Encrypt, etc. It is normally employed to avoid illegal access to personal computers or corporate networks from external unsafe entities

    network-security
    391 queries in 0.781 seconds.