I got a chance to play with Squid and iptables. My job was simple : Setup Squid proxy as a transparent server. Main benefit of setting transparent proxy is you do not have to setup up individual browsers to work with proxies. System: HP dual Xeon CPU system with 8 GB RAM (good for squid). Eth0: IP:192.168.1.1 Eth1: IP: 192.168.2.1 …
Read More »The Long-Term Impact of User Account Control
The problem with running as an administrator is obvious: any malware that attacks users, or the applications they run, will have full control over 90 percent of the computers it infects. The User Account Control (UAC) feature in Windows Vista is the Microsoft solution to a pervasive security challenge—the fact that over 90 percent of users currently on the Windows …
Read More »The “De-perimeterization†of Networks
The architecture of the network perimeter is changing. The wisdom of the past was to harden the perimeter as much as possible by layering multiple technologies to detect and protect against threat. The concept was to secure organizational borders and then, after that, the network. There were various business drivers that put this “perimeterization†in sync with the needs of …
Read More »Fundamental Computer Investigation Guide For Windows
Internet connectivity and technological advances expose computers and computer networks to criminal activities such as unauthorized intrusion, financial fraud, and identity and intellectual property theft. Computers can be used to launch attacks against computer networks and destroy data. E-mail can be used to harass people, transmit sexually explicit images, and conduct other malicious activities. Such activities expose organizations to ethical, …
Read More »Step-by-Step Guide to Getting Started with Microsoft Windows Server Update Services 3.0
Microsoft Windows Server Update Services (WSUS) 3.0 provides a comprehensive solution for managing updates within your network. This document provides instructions for basic tasks for deploying WSUS 3.0 on your network. Use this guide to perform the following tasks: Install WSUS 3.0. Configure WSUS 3.0 to obtain updates from Microsoft. Configure client computers to install updates from WSUS 3.0. Approve, …
Read More »File and Printer Sharing in Windows Vista
Microsoft® Windows Vistaâ„¢ has made some important changes to the way that file and printer sharing works. This article describes the changes and provides step-by-step instructions for sharing files and printers and connecting to shared files and printers from a computer running Windows Vista for a small-office or home office network that does not use the Active Directory® domain service. …
Read More »DNS Stub Zones in Windows Server 2003
Stub zones are a new feature of DNS in Windows Server 2003 that can be used to streamline name resolution, especially in a split namespace scenario. They also help reduce the amount of DNS traffic on your network, making DNS more efficient especially over slow WAN links. This article will look in detail at what stub zones are, how they …
Read More »Prosedur Sweeping Windows bajakan
Pihak POLRI TIDAK BERHAK Untuk mengambil komputer dari TKP kecuali TERBUKTI TERLIBAT dalam tindakan kriminal (praduga Tak bersalah) Misalnya dipergunakan untuk membuat CD/DVD bajakan itu sendiri, menjual software bajakan, mempubilkasikan secara umum (bersifat komersial) seperti isilagu/ringtone MP3, toko menjual barang ilegal (hard ware curian), credit card fraud, dll. Proses PEMBUKTIAN KETERLIBATAN seseorang dalam tindakan kriminal yang menggunakan komputer membutuhkan waktu …
Read More »DNS Conditional Forwarding in Windows Server 2003
Conditional forwarding is a new feature of DNS in Windows Server 2003 that can be used to speed up name resolution in certain scenarios. They can also be used to help companies resolve each other’s namespace in a situation where companies collaborate a merger is underway. This article will look in detail at how conditional forwarding works, how to configure …
Read More »