Archive

Archive for August, 2004

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

August 30th, 2004
Comments Off on Real 802.11 Security: Wi-Fi Protected Access and 802.11i

After the initial thrill of setting up your own wireless network is gone, you try looking into the ways of making it more secure. Common sense tells you that following the manuals on securing the network widely available on the Internet should help, but what if your responsibilities include managing an array of enterprise-level WLANs? Moreover, what if you want to understand the internals and perhaps code your own tools in the future instead of following the “point and click” or “enter this command” paradigm?
Read more…

Articles, Reviews

Exploiting the Potential of Linux

August 27th, 2004
Comments Off on Exploiting the Potential of Linux

Organizations today are struggling with how to expand their business and compete in the face of lean IT budgets. Doing more with fewer resources, optimizing systems and revitalizing IT infrastructures for greater efficiency and agility to respond to ever- changing business conditions remain at the top of many business leaders’ agendas.
Read more…

Articles

Protection From the Perimeter to the Core

August 20th, 2004
Comments Off on Protection From the Perimeter to the Core

A decade ago, Internet security pioneer Bill Cheswick proposed a network security model that he famously characterized as a “crunchy shell around a soft, chewy center.” Today, as more and more “outsiders” – remote users, business partners, customers, contractors – require access to corporate networks, enterprises are finding the idea of a “soft center” obsolete, if not downright dangerous.
Read more…

Articles

Red Hat Fedora Linux 2

August 18th, 2004
Comments Off on Red Hat Fedora Linux 2

Few people in the industry would ever acknowledge purchasing and reading the “For Dummies” books to expand their knowledge. Red Hat Fedora Linux 2 is a book written specifically with an average user in mind. Accompanied by a DVD that´s equivalent to 9 CDs from Fedora Core 2 (OS, tools and applications, source code, documentation), the book presents a complete solution for anyone willing to use Linux at home.
Read more…

Articles, Reviews

Identity, Identifiers and Identity Fraud

August 16th, 2004
Comments Off on Identity, Identifiers and Identity Fraud

Recently the press and the public policy makers have begun to speak of “Identity Theft” as though it was a novel concept requiring severe new legislation.
Read more…

Articles

Vulnerability Protection: A Buffer for Patching

August 13th, 2004
Comments Off on Vulnerability Protection: A Buffer for Patching

The purpose of this paper is to identify the problem facing the network security community regarding vulnerabilities and patches. It explains why current security technologies such as firewalls, intrusion detection and prevention systems, and automated patch management solutions have failed in preventing vulnerabilities from being exploited. Finally an alternative approach is proposed that incorporates and builds upon existing security technologies.
Read more…

Articles

VPNs – Blessing Or Curse?

August 11th, 2004
Comments Off on VPNs – Blessing Or Curse?

VPNs have recently moved on to become second generation technology. From having one or two VPNs, companies are now looking to install large numbers. These numbers are likely to grow steadily and in a few years’ time, organisations may potentially have thousands of VPNs. This proliferation brings undoubted benefits, but also some very major challenges for IT department.
Read more…

Articles

Spam Blocking Techniques

August 9th, 2004
Comments Off on Spam Blocking Techniques

Recent analyst estimates indicate that over 60 percent of the world’s email is unsolicited email, or “spam.” Spam is no longer just a simple annoyance. Spam has now become a significant security issue and a massive drain on financial resources. In fact, this deluge of spam costs corporations an estimated $20 billion each year in lost productivity.
Read more…

Articles

Automated Penetration Testing – False Sense of Security

August 6th, 2004
Comments Off on Automated Penetration Testing – False Sense of Security

The security industry has matured quickly over the past few years with penetration testing becoming one of the norms for organisations adopting best-practice processes. Loosely defined as the process of actively assessing an organisations security measures and completely reliant on consultancy services, security manufacturers have been eager to bridge the gap between product and service and more importantly to reap the benefits of additional profits. Not surprisingly, we have seen the emergence of the automated penetration test with a number of providers springing up to fill the sector.
Read more…

Articles

Risk and Realities of WLAN in the Enterprise

August 4th, 2004
Comments Off on Risk and Realities of WLAN in the Enterprise

Businesses are embracing WLAN for many reasons, most commonly for the convenience it offers. No need for wires gives employees the freedom to work in common areas or from hard to reach places. Employees are also finding the convenience of remote working using WLAN from home and public hotspots.
Read more…

Articles