Posts Tagged ‘network security’

SSHv2 Encryption – A Vital Element of Console Server Security

Friday, January 7th, 2011

When adding a console server to a network application, it’s vital to make certain that the console server includes adequate security features in order to make certain that critical command functions are protected from access by unauthorized users. The reason for this is simple: a console server provides command access to servers, routers, switches, firewalls and other important network elements. That’s why WTI console server products feature multiple layers of security; including password protection, an assortment of user authentication programs and SSHv2 encryption.

(more…)

Seven Overlooked Network Security Threats for 2011

Monday, January 3rd, 2011

Just when you thought your network was totally secure …

No one working in network security can complain that the issue has been ignored by the press. Between Stuxnet, WikiLeaks server attacks and counterattacks, and the steady march of security updates from Microsoft and Adobe, the topic is being discussed everywhere. IT workers who have discovered that consolidation, off-shoring, and cloud computing have reduced job opportunities may be tempted to take heart in comments such as Tom Silver’s (Sr. VP for Dice.com) claim that “there is not a single job position within security that is not in demand today.”This and similar pronouncements by others paint a rosy picture of bottomless security staff funding, pleasant games of network attack chess, and a bevy of state-of-the-art security gadgets to address threats. Maybe.

(more…)

WTI Console Servers – IP Address Filtering to Keep Unauthorized Users Out

Friday, December 24th, 2010

IP Address Filtering (or “IP Security”) allows WTI Console Server products to restrict unauthorized IP addresses and domain names from establishing inbound Telnet, web or SSH connections to the console server unit. This essentially enables network administrators to grant access to only a specific IP address or group of IP addresses, or block a group of IP addresses or an individual IP address completely.

(more…)

Network Administrator – Best of 2010

Tuesday, December 21st, 2010

Here are ten handy tips for network administrators … almost as handy as an out of band management solution.

#1 How to create your own Cat 5 patch cables

For do-it-yourselfers, knowing how to create your own Cat 5 patch cables in the length that you want can be very handy and save you money. Jack Wallen shows you how to get it right. Read the original post.

(more…)

US appoints first cyber warfare general

Monday, May 24th, 2010

Although this is probably an intelligent move, it still seems like it would be easier if the government just made doubly sure that their own networks were secure …

Pentagon creates specialist online unit to counter cyber attack amid growing fears of militarisation of the internet

The US military has appointed its first senior general to direct cyber warfare – despite fears that the move marks another stage in the militarisation of cyberspace.

The newly promoted four-star general, Keith Alexander, takes charge of the Pentagon’s ambitious and controversial new Cyber Command, designed to conduct virtual combat across the world’s computer networks. He was appointed on Friday afternoon in a low-key ceremony at Fort Meade, in Maryland.

(more…)

McKinnon extradition put on hold

Thursday, May 20th, 2010

Bringing a hacker to trial is a good start … but I’d rather see them going after the people who write the viruses and malware instead.

Theresa May agrees adjournment of judicial review to consider whether Gary McKinnon is fit to be extradited to US

The extradition of the computer hacker Gary McKinnon has been put on hold after the home secretary, Theresa May, agreed to an adjournment of a judicial review that was supposed to start within days.

The move will allow May to begin formal consideration of the medical evidence to see whether McKinnon is fit to be extradited. If it is established that he cannot be allowed to go, it paves the way for a prosecution in the UK.

A Home Office spokesperson said: “The home secretary has considered the proposal from Gary McKinnon’s legal team and has agreed an adjournment should be sought. An application to the court is being made today.”

(more…)

Windows 7 64-bit And Windows Server 2008 R2 Vulnerability Emerges

Wednesday, May 19th, 2010

Here’s some vital information for Windows 7 64-bit and Windows Server 2008 R2 users …

The Microsoft Security Response team released a security advisory yesterday, The team is investigating a publicly reported vulnerability that is affecting 64-bit editions of Windows 7 and Windows Server 2008 R2 as well as Windows Server 2008 R2 for Itanium systems.

The vulnerability was discovered in the Windows Canonical Display Driver (cdd.dll) which is used by “desktop composition to blend the Windows Graphics Device Interface (GDI) and DirectX drawing”.

(more…)

Nato ‘faces cyber attack threat’

Wednesday, May 19th, 2010

Hopefully, this will lead to the creation of a new generation of network security strategies that the entire world can benefit from …

• Next attack could come down fibre optic cable, warn experts
• Russia seen as potential partner in missile defence against Iran

The world’s most powerful military alliance is increasingly vulnerable to attack by unconventional weapons and cyberwarfare in particular, Nato governments were warned today.

“The next significant attack on the alliance may well come down a fibre optic cable”, according to a draft new Nato “strategic concept”. There are unacceptable “serious gaps” in Nato’s cyber defences, it warns.

(more…)

Network security: Seven tips for desktop malware first responders

Friday, May 14th, 2010

This is definitely very helpful advice for anybody who uses the internet …

A few months ago I was attending a conference in Orlando. It was cold by Orlando standards, and the locals, mindful of their dependence on tourism during a recession, were apologetic – that is, especially hospitable. It was a productive meeting and I had a bounty of business cards and URLs to check out. An hour before leaving the hotel for the meeting’s second day, I connected to the hotel network and browsed a few sites.  One of the sites, an engaging blog, featured a lively set of comments with a blog post, so I absentmindedly clicked through the comments. I paused to answer a knock at the door, and returned to find that a bit of malware had begun to take over my Windows notebook.

This preamble explains the Windows-centric character of this blog post. The principles would be similar for non-Windows platforms, but the particulars would vary.

(more…)

A Secure Console Server

Monday, May 10th, 2010

Console servers are a way into your network. A console server can provide remote access to your servers, routers, switches and other network devices. Due to this ease of access to critical devices, it is important that your console server includes the latest security and authentication features.

(more…)