Network Security by Filtering
Filtering allows network administrators to control which packets are permitted or denied in or out of a network. It can be used to control how much bandwidth can be used by parts of a network, but is more often used to provide security for a network. More ...
Data Encryption
There are two kinds of key encryption: private key and public key. In private key encryption a single key is used. Public key encryption uses two keys. One key, called the private key can only be used to decrypt a document. The other key, called the public key, can only encrypt a document. More ...
How a Firewall Provides Network Security
A firewall provides security by controlling access between a network and an untrusted network. A firewall can be a hardware device, software, or combination of hardware and software. More ...
Nessus Network Vulnerability Scanner
Nessus is a network vulnerability scanning program that scans network hosts for vulnerabilities and generates reports on its findings. More ...
What is a SQL Injection Attack?
SQL injection can be used by an attacker to inject code into a website in order to access and manipulate the database behind the site. More ...
Difference Between Rule and Role Based Access Control
Access control is the method used to block or allow access to a network or network resources. Two types of access control are rule-based and role-based. The difference between rule-based and role-based access control is explained here. More ...
Methods to Combat Distributed Denial of Service (DDoS) Attacks
DDOS attacks are costly in terms of lost revenue and added costs. DDoS attack protection plays a fundamental role in keeping businesses online. Here are some strategies that can be used to protect against a DDoS attack. More ...
How to Use the Open Source Intrusion Detection System SNORT
In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. More ...
Domain Name System (DNS) Vulnerabilities
The original design of the DNS did not include robust security features. DNS vulnerabilities open networks to various types of attacks, cache poisoning and DDoS attacks being the most common. More ...
Detecting Network Sniffers
A packet sniffer is a program or device that eavesdrops on network traffic and gathers data from packets. Malicious intruders may install packet sniffers in order to retrieve usernames and passwords. More ...
How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching and matching, and can be used to detect a variety of attacks and probes. More ...
Digital Signatures and Certificates
The construction of the Digital Signature entails applying a hash function to the message by concatenation of the message with a known secret key and then applying a mathematical function which will produce a fixed length output known as the digest. More ...
Prevent Hacking with Password-Cracking Countermeasures
Taking some general countermeasures can prevent hacking of your important passwords. Many people use the same passwords on every system they use. For this reason, you might instructg users to create different passwords especially on the systems that protect information that's more sensitive. More ...
