Thursday , 13 December 2018
Home 4 Tag Archives: Firewalls

Tag Archives: Firewalls

Hackers Beware

By Eric Cole New Riders Publishingh | 817 pages | PDF | 5.017 KB | Download | Password: hacker No matter what field you work in, you cannot help but notice the impact that the Internet has had on society. It has opened up opportunities and markets that people only dreamed of before. As with any new technology, there is always a positive and negative aspect. The positive side is the tremendous business opportunities. The negative side is the huge security risk that is now posed to so many companies, yet few companies are truly aware of the potential danger. It’s like getting in a brand new car and driving down the road at 80mph, only to realize that the engineers did not equip the car with breaks. If this did occur and a large number of people bought the car, the net result would be a high number of …

Read More »

Don’t let your PCs join the zombie hordes

A zombie computer or “bot” lets an unauthorized person gain control over it, a hacker, a malicious website or email or a tainted USB thumb drive is typically the source of infection. The zombie or bot patiently waits to be summoned to perform some nefarious task often as a part of an army of tens of thousands or even millions of zombie PCs called a botnet. Attackers can access list of zombie PCs and activate them to help execute DoS (Daniel of service) attacks against web site, to host phishing web sites or to send spam email message, tracing an attack back to its source leads only to an unwitting victim rather than the true attackers. Zombie infections are good at hiding so they are not noticed and escape removal, they often have file and process names similar or even identical to normal system file names and processes so users …

Read More »

Build Your Own Free security suite

Do it all suite are the name of the security game these days, sure you can gather free programs that cover the bases much as a suite would, but who wants to bother with finding out which apps work together and which one might leave you pulling your hair out. Your Anti Virus Base For free collection with AVG free 8.0, it installs easily and it works under XP and vista, it ads for its paid version don’t get in the way, and since it ferrets out spyware and adware, you don’t need to install a separate antispyware program, also it generally does well in signature based detection test from organizations such as AV-Test.org (those test typical evaluate the paid product, but the free and paid version use the same signature base scanner. AVG Free does have the same limitations, though the app will detect and block rootkits, stealth technology …

Read More »

Turn on/off the firewall Windows Vista

There are cases when, for different reasons, you might need to disable or enable the Windows Vista’s firewall. In this short tutorial we will show you how this can be done. Just follow the steps described below and you will be done in no time. The easiest way to find the Windows Vista Firewall is to type the word firewall in the Start Menu search box. You will see these two results: Windows Firewall with Advanced Security and Windows Firewall. Click on the second result and the main window of Windows Firewall will open.

Read More »

What You Need to Know About Intrusion Detection Systems

Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems are becoming increasingly important in helping to maintain proper network security. Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems (often abbreviated IDS) are becoming increasingly important in helping to maintain proper network security. Whereas other boundary devices may collect all the information necessary to detect (and often, to foil) attacks that may be getting started or …

Read More »

Creating Networks with ISA 2004 (Part 2)

In part one of this article series we focused on network creation and network relationships. In this article we will focus on advanced network design and network flow within ISA 2004. We have already established in the previous article that the ISA server is used to divide networks and that networks are able to be defined and policies assigned to each network in form of a defined rule base for each network. Contrary to sensationalist belief, the DMZ and networks like it are still alive and well and have a place in networking. In fact the very people that say that the DMZ is dead are the ones that are paranoid about publishing servers that reside on the internal network and for this reason prefer to have an extremely secure back to back firewall scenario in place that offers highly secure access. This in itself is an advanced type of …

Read More »

Creating Networks with ISA 2004 (Part 1)

Most organizations have started to realize the true benefit of ISA 2004 as an enterprise grade firewall and I have noticed a trend emerging among numerous enterprises moving towards using ISA to protect critical information assets. ISA is also being used to replace competitive products that do not offer similar application level protection for Microsoft networks. For this reason the creation and segmentation of networks is pertinent within ISA. ISA Server 2004 is built to provide a multi-networking model that affords granular control of network traffic between networks. These networks can be defined within the network objects in the ISA Server Management; by configuring these options, advanced configurations of multiple networks with intricate relationships can be achieved. ISA networks ISA networks are designed or created depending on the location of ISA server in relation to the other network elements within the network. For example if a DMZ is required and …

Read More »