Linux Network Security

Discover Network Security News

Specter Of network attacks looms anew

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Internet service providers and dot-coms hit by a storm of denial-of-service attacks earlier this year should brace for another onslaught, say knowledgeable security experts. Simple Nomad, aka Mark Loveless, a senior security analyst at information management and security company BindView, unveiled . . .

Openhack: Lessons learned

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When it comes to security, build for success, but plan for failure. eWEEK Labs' Openhack.com e-business site was built from the ground up with security in mind, and the site was co-designed and co-maintained by security company Guardent Inc. Yet Openhack . . .

The Reality of Building Secure Private Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"IPSec is beginning to support key business and technology objectives such as B2B extranet backbones and dial access VPN's for remote computing. Despite the security and operational benefits of a VPN, the problem of authenticating client entities for access control decisions . . .

Excite@Home IP flaw exposed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Excite@Home -- an Internet service run in Australia by Cable & Wireless Optus -- has warned it will take action against anybody who attempts utilise an IP vulnerability that allows a single user to block up to 127 IP addresses, effectively . . .

Tools of the Trade: nmap

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The intent of this article is to familiarize the reader with the network scanner nmap. As Lamont Grandquist (an nmap contributor/developer) points out, nmap does three things: It will ping a number of hosts to determine if they are up. It . . .

Users fail to see full security picture

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Businesses are still not ready to take an enterprise approach to security, according to leading vendor Network Associates (NAI). Despite consolidation in the market - including the $975m buy-out of security firm Axent by anti-virus specialist Symantec last week - NAI . . .

Digital Signatures and Stolen Automobiles

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Digital signatures require extensive safekeeping. Unlike passwords, you can't store them in your head. The number sequence is too long. You have to store the signature on a smart card, keep it on your hard drive, or carry it around on . . .

We're still getting security wrong

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Worries about security, and justified ones at that, could still stop the eCommerce bandwagon in its tracks, it seems. The recent revelation of a security loophole in MS Outlook has been followed by a report from IDC asserting that corporate Europe . . .

Denial-of-service threat gets IETF's attention

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Internet Engineering Task Force (IETF) last week launched a working group to develop ICMP Traceback Messages, which would let network managers discover the path that packets take through the Internet. Nicknamed itrace, the new working group plans to submit a . . .

Linux Networking: Using Ipchains

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The article examines the basic concepts pertaining to routing, network address translation (NAT), firewalls, and a program called ipchains. Individual sections address each concept. The last section combines the basics into a sample configuration for linking a local network to . . .

Secure Directory Services for E-Business, Part 3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The threats to a directory are many, and if appropriate safeguards are not maintained, a company may not even know when a directory has been compromised. The primary threats include theft, destruction and alteration of information (including user privileges). The potential . . .

IPSec - We've Got a Ways to Go

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IPSec, supposedly the next great thing that will fix most (if not all) our network security problems. No longer will attackers be able to sniff network traffic, hijack connections or spoof servers. Hijacking domain names will be impossible with DNSSEC, and . . .

ADSL fundamentally insecure - BT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The head of broadband services at BT has acknowledged that its implementation of ADSL lacks security and it will be up to third parties to ensure customers' data is unhackable. Chris Gibbs, who is masterminding the introduction of ADSL in . . .

A security skills test

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a great article by the SANS director, Alan Paller. "The recent distributed denial-of-service attacks on sites such as eBay and Yahoo were directly enabled by security mistakes almost certainly made by unskilled systems administrators at the University of California . . .

Security, the Way It Should Be

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a pretty good article on steps that can and should be taken to improve the level of security on your network. " Today, security is often provided by patched-together, reactionary defenses, which many see as an inhibitor to business. . . .

It's Time To Clamp Down

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For businesses trying to protect themselves, there are big challenges. It's expensive, both in terms of capital and skilled labor, to secure networks, mobile workers, and E-commerce operations. Security staffs are being asked to deploy a growing number of security applications, which by their very nature are complex. . . .

The New E-Security Frontier

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The proliferation of Internet technologies has helped fuel the telecommuting wave with its mobility and connectivity needs, but it's been a double-edged sword as that very mobility has increased security threats to networks from dial-up and wireless access. While companies . . .