Skip to main content

Intel

Revelation 7:11

posted onSeptember 18, 2001
by hitbsecnews

By: biatch0

Before you read the rest
of this, please be notified that this is a walk down memory lane of sorts for
me, not to mention somewhere that I poured out whatever little there is in that
twisted mind of mine. It is a long article. Moving on now.

Intranet Security 101

posted onSeptember 18, 2001
by hitbsecnews

By: orange

This text is just a simple viewpoint on securing an internal network for today's increasingly hostile digital world.

We will cover simulated levels of an internal network from the following hierarchy (lowest to highest):

  • Desktop PCs
  • Mobile Devices (Laptops)
  • Internal Servers
  • DMZ Servers
  • Gateways

Desktop PCs

Issue #20

posted onAugust 14, 2001
by hitbsecnews

It's certainly been a long month. We've had our fair share of network interruptions (full credit for this goes to the superb network kung-fu skills of TMNet, our top level provider), power cuts, and overall headaches, but thankfully the zine hasn't been delayed :). We originally had 10 articles in the line up, however three contributors couldn't make the deadline, so I had to go with 6. I'm sure you'll enjoy the read all the same.

Intro to hacking routers and other nifty bits

posted onAugust 14, 2001
by hitbsecnews

By: Octet

Contents:
1.) Intro
2.) Routers/routing
3.) Switches,hubs.
4.) The beauty of the insecure bus topology.

Basic text to hacking/manipulating routers,how switches and hubs work and some other shit composed by octet. I just figured that I haven`t anything to do so why not write this text?

To keep kiddies and whatever form of idiots that may read this text clueless i`m not describing (a) what a router is (b) what a router does and (c) how to identify a router.Note: I never mentioned "how a router routes"

Hardening Your Windows 2000 Server

posted onAugust 14, 2001
by hitbsecnews

By: madirish

The following simple 7 steps are ones you can take to easily enhance the overall security of your Windows 2000 Server. These are quick and dirty steps to enhance your security and can be used in addition to any third party security tools and firewalls you may have already implemented.