Skip to main content

Networking

Introduction to Network Security

posted onOctober 20, 2001
by hitbsecnews

Source: Linux.com

"What? You said you don't have security on your network? Gasp! Well, that's what we're here to talk about. We're going to share some reasons why you want security on your box along with a few pointers on how to secure your network. We're not going to go into great detail (that's for later articles). Our aim is to make you more aware of why you need to secure your network and then point you in the right direction."

Hackers Put A Price Tag On New Attack Tool - Want it ? It will cost you !

posted onOctober 19, 2001
by hitbsecnews

A new hacking tool is being actively used by attackers hoping to take remote control of unpatched Unix-based systems, security experts warned today. While the attack tools exploit a relatively old bug for which patches were issued months ago, Temmingh reports that one individual was asking for unspecified financial compensation for sharing the script - a development which he views as ominous.

When, how and why a hacker should be used for a security audit

posted onOctober 19, 2001
by hitbsecnews

Source: Security News Portal - SNPortal

As businesses continue putting their infrastructure jewels online via Web-enabled e-commerce sites, the importance of security and privacy becomes increasingly critical. A crucial way of addressing this need to protect the company Web site is to conduct a security vulnerability assessment (SVA)--a security audit or ethical penetration test, as an SVA is also known.

Commentary: Crackers and Feds working together? What it will take:

posted onOctober 18, 2001
by hitbsecnews

Since the September 11th attacks on the World Trade Center, a debate has come
about arguing the merits of cracking Afghani and affiliated group websites by
supporters of the United States. Almost instantaneously, US citizens armed
with PC's began attacking infrastructure relating to Afghani-supported groups,
only to be rebuked by the NIPC
(National Infrastructure Protection Center,) which said that "Those
individuals who believe they are doing a service to this nation by engaging in

The enemy in the mail -:- Seven steps to securing your mailroom

posted onOctober 18, 2001
by hitbsecnews

Source: Security News Portal - SNPortal.

There are a number of relatively inexpensive steps that can be taken to fight the bio-terrorism war that is currently being waged through the US mail. The issue is one of containing possible contaminants and minimising the potential for damage. "Nothing can prevent the possibility of a terrorist hell-bent on forwarding a suspicious substance in the mail," says John Puskar, P.E., principal of CEC Consultants.

US plan for secure internet 'flawed'

posted onOctober 17, 2001
by hitbsecnews

Security experts have warned that the secure computer network planned by the US Government could be undermined by careless users.

The Bush administration, newly focused on security since the 11 September attacks, wants to create a network, called Govnet, to provide protected data and voice communications.

Richard Clarke, recently named special advisor to the president for cyberspace security, is behind the new initiative and believes it to be vital to future, critical, government operations.