The term port knocking refers to a type of host-to-host communication where the information flows across closed ports. The primary purpose of port knocking is to keep attackers from successfully conducting a port scan since the server will require the correct port knocking protocol or sequence before the port is opened. There are a few types of port knocking methods, including encoding information in a packet-payload or a port sequence. When the port knocking method is used, the data is sent to a closed port and a daemon that is Read More
Peer Guardian
Peer Guardian is perhaps the most popular IP blocking software tool on the web. The Peer2Peer sharing community primarily uses Peer Guardian to block the RIAA, MPAA, and other organizations from tracking a sharer’s IP address and online activity. In addition to blocking IP addresses, Peer Guardian also blocks adware, spyware, and government and educational IPs. Peer Guardian is an open source that Phoenix Labs originally developed. The latest version is Peer Guardian 3. However, since Peer Guardian 3 is only supported on MS Windows Vista, Peer Guardian 2 continues Read More
Cisco VPN Error 412
Cisco VPN error 412 occasionally occurs when using the Cisco VPN client. The exact error message may differ between versions of the Cisco VPN client, but will be similar to this: Error Secure VPN Connection terminated locally by the Client. Reason 412: The remote peer is no longer responding. Causes for Cisco VPN Error 412 There are many error 412 causes, including: Poor network connection. Packet delay or loss can force the VPN session to drop. Hardware failure in a network interface card or network device. A firewall or ACL Read More
Federated Identity Management
Federated Identity Management is a version of Single Sign-On where each device, system, and application queries a centralized database for authentication and authorization information. In addition to the goals of any other identity management system, Federated Identity Management systems are tasked with enabling authentication and authorization data across organizational boundaries. In a true Federated Identity Management system, authentication data can be passed across security domains from within a company to its business partners. This can enable Single Sign-On to extend past organizational boundaries. Federated Identity Management is often abbreviated FIM. Read More
Mobile Firewall
A mobile firewall is a hardware and software system that is designed to protect wireless communication networks from unauthorized access and use. The whole system works when it is used connectively and if the mobile node, the firewall hardware and software system, and the network itself are present and operational. The mobile communications firewall system is made and designed to safeguard the network's system together with all of the mobile clients or subscribers that make use of the services offered by the network. The mobile firewall system acts as an Read More
What Are the Effects of Computer Hacking?
Hacking as a Destructive Tool The common stance on hacking with the average person is that it is morally wrong. There have been several instances where hacking has proven to have caused problems. Hacking can create a variety of damages to people, groups and systems of broad spectrum. Negative Hacking Interactions: Identity Theft – Some hackers can gain access to sensitive information which could be used to fuel identity theft. This identity theft can cause damages to credit ratings from consumer agencies, run-ins with the law because the person who stole the identity Read More
RADIUS (Remote Authentication Dial in User Service)
RADIUS (Remote Authentication Dial In User Service), defined in RFC 2865, is a protocol for remote user authentication and accounting. RADIUS enables centralized management of authentication data, such as usernames and passwords. When a user attempts to login to a RADIUS client, such as a router, the router send the authentication request to the RADIUS server. The communication between the RADIUS client and the RADIUS server are authenticated and encrypted through the use of a shared secret, which is not transmitted over the network. The RADIUS server may store the Read More
How to Monitor Wireless Traffic
Wireless traffic is considered to be those Internet protocol packets that are transmitted through an 802.11a, b, g, n, or i wireless protocol. Monitoring Requirements There are a few things to consider when planning to setup wireless traffic monitoring. First, the user must determine what kind of traffic will be monitored. Is the traffic to or from local systems or to and from a system the user has no direct control of? Second, the user needs to have the appropriate wireless adapter installed in his/her system, with its proper driver Read More
Single Sign-On
Single Sign-On is a term which describes an enterprise-wide identity management system. In a Single Sign-On system, each user has one username and one password for all of the systems, devices, and applications to which she has access. The two methods utilized by Single Sign-On systems to do this are: Password synchronization – The Single Sign-On system copies the username and password configuration to each system Centralized account management – Each system is configured to query a central database for user authentication and authorization Single Sign-On systems have the promise Read More
Packet Sniffers
Packet sniffing is listening (with software) to the raw network device for interesting packets. When the software sees a packet that fits certain criteria, it logs it to a file. The most common criterion for an interesting packet is one that contains words like “login” or “password.” To packet sniff, obtain or code a packet sniffer that is capable of working with the type of network interface that the operating system supports: Network interfaces include: LLI NIT (Network Interface Tap) Ultrix Packet Filter DLPI (Data Link Provider Interface) BPF (Berkeley Read More
Share on: