Due to the overwhelming demand for access to the free training session on Friday, May 8, we’ll be extending the offer of a free seat to Getting Started with GroundWork until the end of June, 2009. There is a limit of 40 students per class, so you’ll want to reserve your spot now. But please, […]
Category Archives: Security
NetFilter Checklist Building a NetFilterbased firewall is not difficult. End users interested in setting up their own NetFilter firewall can use the following brief checklist: Step 1. Select a system to be used as the firewall. Step 2. Install additional network interfaces (minimum number of required interfaces is two). Step 3. Install […]
Cisco networking questions What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ? What is the difference between an unspecified passive open and a fully specified passive open Explain the function of Transmission Control Block What is a Management Information Base (MIB) What is anonymous FTP and why would you use it? What is a pseudo […]
Denial of Service One of the simplest forms of network attack is a Denial of Service (DoS) attack. Instead of trying to steal information, a DoS attack simply prevents access to a service or resource. There are two general forms of DoS attacks: those that crash services and those that flood services. Denial of Service […]
TCP/IP Hijacking : TCP/IP hijacking is a clever technique that uses spoofed packets to take over a connection between a victim and a host machine. This technique is exceptionally useful when the victim uses a one-time password to connect to the host machine. A one-time password can be used to authenticate once and only once, […]
Great Aussie firewall claims first victim Forum threatened with fine for link to banned site By John Oates Posted in Government, 17th March 2009 09:30 GMT The great Australian Firewall might be struggling to make political progress, but regulators are already using its blacklist to threaten local websites with fines. Broadband discussion forum Whirlpool was […]
Crackers latch onto year-old Windows token vuln Track this topic Print story Post comment Unpatched bug features in multi-stage attacks By John Leyden Posted in Security, 18th March 2009 20:25 GMT Hackers have created exploits against a long-standing, unpatched Windows “token kidnapping” vulnerability. The appearance of attacks follows a year after security researchers Cesar […]
RFC 1631 1. Static NAT – allows public host to communicate with a private host by creating a static one-to-one IP translation entry 2. Dynamic NAT – pool of available addresses are assigned to private hosts for internet access on an ad-hoc basis by creating a dynamic one-to-one IP translation entry 3. NAPT (PAT) – […]
Exhausts a resource limitation on the network (eg TCP, ICMP) or within an OS or app (eg HTTP, FTP ie keeping open all available connections supported by that server) to make the service unavailable for normal use – Among the most difficult to completely eliminate because of the way they use protocol weaknesses and ‘native’ […]