Secure My Network - Page 7 - Results from #36 |

How to secure my network

Find the HOWTO or step-by-step guide that you need right here.


Discover How To Secure My Network HOWTOs

Need Help writing SNORT Rules for the following I've never done this before


I need some help in writing snort rules for the following, I have never done this before, can someone please help me. Thanks 1. (1 point) Write a Snort rule that will alert on TCP traffic exiting the network with the content "proprietary". I do not care where the traffic is going or what ports it is using. When Snort creates the alert it should read "Proprietary information leaving!" 2. (1 point) Write a Snort rule that will log any TCP traffic entering into the and networks with destination ports 1 through 1024. I do not care about the source IP addresses or source ports. When Snort logs the traffic it should read "Incoming to low ports". 3. (1 point) Write a Snort rule that will alert on UDP traffic entering the network that contains the content "cgi-bin" anywhere between the 5th byte offset to the 25th byte offset. The alert should trigger on both lowercase and uppercase content. I do not care about the source ports or destination ports. When Snort creates the alert it should read "UDP CGI exploit".

Open Source Tool/Month: NMAP for Enterprises


So when many people think of Nmap, it is often related to those who are new or learning in the world of scanning and tracking network ports. It's open source. It's easy to use (with a GUI). It has a full community of friendly users, plays well with friends, is good with children and even makes cupcakes at parties (okay maybe not those last few). The point is, the reality may not always be apparent; that Nmap provides some serious, enterprise, #&$#!-kicking functionality. And while we tend to avoid pushing specific papers or How-tos that cost money, this paper we found brought up a nice point considering that Nmap is, in fact, our Open Source Tool of the Month. So if you were curious as to whether Nmap is serious enough to warrant charging for a how-to, (without shame that is) check this out. Could you find this information elsewhere? Probably. Is it as good? We don't know, we didn't buy it :) Is it easier to understand and follow, especially for someone in a business environment? Just maybe. Either way, when push comes to shove, it's nice to see an open source tool get some attention. And who knows? If there's some company manager that doesn't trust Nmap's functionality, maybe a paid analysis of its utility could go farther in convincing them than some free how-to you found online (even from such a trustworthy, experienced site such as this :) Fair is fair, and heck, its food for thought.

FTP Server setup with TLS (Transport Layer Security) on Debian


If you are planning on using FTP and want to use the TLS protocol, here is a simple and effective HowTo on installing it and getting up and running for your system. The TLS protocol allows applications to communicate across a network in a way designed to prevent eavesdropping, tampering, and message forgery. TLS provides endpoint authentication and communications privacy over the Internet using cryptography.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.