How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and can be used to detect a variety of attacks and probes. More ...
Prevent Hacking with Password-Cracking Countermeasures
Taking some general countermeasures can prevent hacking of your important passwords. Many people use the same passwords on every system they use. For this reason, you might instructg users to create different passwords especially on the systems that protect information that's more sensitive. More ...
How to Use the Open Source Intrusion Detection System SNORT
In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. More ...
What is a Botnet Attack and How to Identify It?
Attacks against networks are increasing because attackers find many networks are not properly patched and secured behind a firewall. Once attackers have compromised a machine, they simply install a bot on it to establish communication. The botnet is then controlled by the attacker. More ...
Man in the Middle Attack
In a Man in the Middle (MIM) attack the hacker places eavesdropping equipment between the sending device and the receiving device. He intercepts the data, records it and possibly modifies it, then sends it on to the intended receiving device. More ...
What's the Difference Between Sniffing, Snooping, and Spoofing?
Network sniffing and snooping involve tapping into network traffic for the purpose extracting usernames, passwords, account numbers, and other information. Spoofing is when a hacker creates an email or a website that appears to genuine but is designed for the purpose extracting usernames, passwords, account numbers. More ...
Overview of IPsec with IKEv1
VPN (Virtual Private Network) technologies such as IPsec (IP Security) with IKE (Internet Key Exchange) offer the ability to transmit over broadband securely. More ...
Email Security
Email has emerged as one of the most important communication mediums. Failing to secure your organization's mail servers may allow spammers to misuse your servers and bandwidth as an open relay to propagate their spam. More ...
The Basics of Network Security
As technology and computer networks grow sophisticated over time, so do the intrusion techniques that scammers use in order to infiltrate them. If you're serious about protecting your company's private information , you need to do a lot more than have a router and firewall in place. More ...
Use of Taps and Span Ports in Cyber Intelligence Applications
SPAN stands for Switched Port Analyzer, a dedicated port on a switch that takes a mirrored copy of network traffic from within the switch and sends it to, typically, a monitoring device, or other tool for troubleshooting or traffic analysis. More ...
Firewall Rules
The purpose of a network firewall is to protect computer and IT resources from malicious sources while allowing internal network users to access the Internet. For this purpose it uses an Access Control List (ACL). More ...
Understanding the Dangers Your Systems Face
It's one thing to know generally that your systems are under fire from hackers around the world and malicious users around the office; it's another to understand specific attacks against your systems. This section discusses some well-known attacks but is by no means a comprehensive listing. More ...
How to Tell if Someone is Lurking on Your Wireless Network
Have you ever wondered if someone else is on your wireless network, with out your knowledge, watching every site you visit or stealing account information? More ...
