post thumbnail

Enable Passwords On Cisco Routers Via Enable Password And Enable Secret

Security is a part of every good technical administrator’s game plan. Luckily the good folks at Cisco have made the task of securitizing a Cisco router fairly straightforward in design- with support given for up to five types of passwords. Taking advantage of these passwords is vital to a network’s internal security, and should be […]

29May2008 | | 15 comments | Continued
post thumbnail

Securing Cisco Routers with No IP Directed-Broadcast

One of several overlooked commands that can produce a world of hurt for networks is the IP Directed-broadcast command. This command was introduced in Cisco’s routers at IOS version 10. Cisco soon realized that this command was being maliciously exploited in denial of service attacks, and action had to be taken- particularly against smurf attacks. […]

3Feb2008 | | 9 comments | Continued
post thumbnail

How to Prevent Denial of Service Attacks

The denial of service attack is statistically the most used malicious attack out of them all. This stems from the ease of use of the attack, as well as the alarming lethality. Literally anyone can bring down a website with a simple command prompt. The question is- how do you protect against an attack that […]

28Jan2008 | | 18 comments | Continued
post thumbnail

How Kerberos Authentication Works

You may not know it, but your network is probably unsecured right now. Anyone with the right tools could capture, manipulate, and add data between the connections you maintain with the internet. The security cat and mouse game isn’t one sided, however. Network administrators are currently taking advantage of Kerberos to help combat security concerns. […]

28Jan2008 | | 21 comments | Continued
post thumbnail

Three Archaic Backdoor Trojan Programs That Still Serve Great Pranks

There are several things that come to mind when talk of the 1990’s comes around. Nirvana, vodka, cheap rap, and well- global warming wasn’t the subject of every conversation. But what really outshines the rest is the world of computing. The world of security was just getting its foothold into what is now a highly […]

28Jan2008 | | 7 comments | Continued