Linux Network Security

Discover Network Security News

HomeChoice in DDOS blitz

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Broadband ISP and video-on-demand outfit HomeChoice has admitted it suffered a denial of service attack yesterday from hackers which disrupted its service to customers. Details of what happened are still somewhat sketchy but a spokesman for HomeChoice said: . . .

When to say "no access"

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the rush to adopt e-commerce, businesses are looking at network security from a perspective that requires both technology and an intuitive sense of how and where to allow access to information. Network security is no longer a matter of . . .

DDoS: Internet Weapons of Mass Destruction

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

EBay. Amazon. CNN. None of these Internet heavy hitters was adequately prepared to withstand a series of DDoS (distributed denial of service) attacks that made headlines and disrupted operations early last year. What makes you think you're in any better position? . . .

Cyber Attacks Prove Costly

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Derrick Lewis writes: "As the computer industry intensifies, so does the amount of cyber attacks. Many Web sites are open to all sorts of "web hacking." According to the Computer Security Institute and the FBI's joint survey, 90% of 643 computer . . .

Resource: Distributed Denial of Service (DDoS)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here is a large collection of DDoS related tools, papers, essays, analyses, news reports, and interviews. The DoS Project's "trinoo" distributed denial of service attack tool and the "Tribe Flood Network" distributed denial of service attack tool are outlined. . . .

Feds Warn Of Concerted Hacker Attacks On New Year' Eve

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal computer security experts are urging system administrators to take added precautions in securing Web servers and network firewalls in advance of the New Year's holiday weekend, citing FBI reports indicating an increase in activity that often precedes widespread cyber attacks. . . .

The 101 Uses of OpenSSH: Part I

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the coolest things about UNIX has been that there is not one but several different ways to administer systems from remote consoles. Sad to say, most of these methods (Telnet, rsh and X, to name a few) send everything . . .

Results of the Security in ActiveX Workshop

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a really good article by Steve Bellovin and others from CERT that attempt to provide "risk management" instead of "risk avoidance". "... this paper serves not only to dispel unwarranted myths about the safety of using ActiveX but also to . . .

How does your Net security rate?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are your servers as secure as Fort Knox or as open as a revolving door? The newly formed Center for Internet Security hopes to answer that question by creating a suite of tests that would give computer owners a rating--on a . . .

Are Employees Your Biggest Security Risk?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I've discussed written security policies in the past--every business needs to have a set in place. If you don't have a written security policy, your employees remain the biggest security risk for your business. If you do have a security policy . . .

System Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Back in the old days security was a pretty straight-forward affair. If you wanted to secure something, you just kept buying locks and alarm systems until you felt secure. Back then, it actually took a good deal of planning and physical . . .

Social engineering simulations

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A question that often arises when planning vulnerability analysis is whether "social engineering" techniques should be used. My consistent answer is no - not unless you are prepared to do an awful lot of work before trying it. Vulnerability analysis is . . .

Security patch distribution - it's trojan time

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The way operating system vendors issue security patches is insecure, in many cases, and could let crackers exploit this to trick users into loading trojan horses onto their systems. Security firm BindView, whose Razor team of security researchers . . .

Pundits: Wireless Web Is Major Privacy Threat

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The wireless Web could become the privacy-less Web. Most experts acknowledge that it will be difficult to make emerging wireless technologies work together, but it could be even harder to protect the privacy of consumers who use them.. . .

Defying Denial of Service Attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a Distributed DoS (DDoS) attack, a hacker installs an agent or daemon on numerous compromised hosts. The hacker sends a command to the master, which also resides on a compromised host. The master communicates with the agents to commence the . . .

Broadband Opens a Back Door

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As the number of DSL and cable modem users goes up, so does the likelihood of online security breaches. Predictions of how many people will be using DSL or cable modem connections to access the Internet over the next few years . . .

DoS alarm sounded over server flaw

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Known as a resource-deprivation attack, Internet data sent in a certain way could cause servers to crash under an artificial avalanche of data. Security consultant BindView Corp. has announced that a widespread flaw in the way that servers handle Internet traffic . . .

E-security still a problem, says report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Almost a third of UK companies experience a complete network crash at least once every 12 weeks, according to a new study. A quarter of companies say they've lost critical data because of virus attacks, and 16 per cent say that, . . .

An Introduction to Incident Handling

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Incident handling is a generalized term that refers to the response by a person or organization to an attack. An organized and careful reaction to an incident can mean the difference between complete recovery and total disaster. This paper will provide . . .

Why Can't IPsec and NAT Just Get Along?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Both IPsec and NAT have been with us for some time, but making them play together has been hard work. To IP gurus, NAT (Network Address Translation) is an ugly kludge because it changes the way IP works at a fundamental . . .