Archive

Posts Tagged ‘Security’

5 Ways You Can Protect Yourself from Online Threats

January 22nd, 2013 1 comment

In a world where everything is connected online, it is very easy to lose the files on your
computer or even your own identity. Protecting yourself from the threats in the virtual world is
one of the primary concerns.

There are scams being hatched to hoodwink people into disclosing their personal details and
account numbers and the security breach is too advanced to control. Do worry too much because
there are experts who can guide you through these problems. Given below are five ways in
which you can protect yourself from these online threats.

1. Install Software For Internet Security

It is no longer sufficient to install only antivirus software in your computer or laptop. Use
software that not only prevents your computer from virus threat but also protects you from
spyware and key loggers. The software should also be able to monitor if your computer is being
accessed by any unauthorized person.

Some softwares, which work as both antivirus and protect your computer, may be a little
expensive. But they are worth it. If you do not want something expensive, you can also find
some free software on the net that you can download.

2. Install A Firewall

A firewall acts like buffer zone between your computer and the whole internet. It is created in
a manner that it allows only that information that you allow to pass through it. This is a great
safety device for your computer, as its programming helps you stop the attack from key loggers,
malicious hackers and worms. You can get lot of internet security software that also has a
firewall.

3. Scan Your Computer Every Week

There are several applications that automatically check the computer for any potential threats. If
your software doesn’t carry out automatic checks then you should scan your computer at least
one every week. It may be a hassle when you are working on the computer, so you may do this
when you are not working. This is important to check that your computer and all the data you
store in it are safe.

4. Update All Your Software Regularly

The hackers and people who are phishing are regularly updating their moves, so it is important
that you keep your internet security software updated as well. You do not have to buy an updated
version from the market, most companies allow you to download the latest version from their website once you have bought the product from them.

5. Keep Back Up For All Your Files

You have your whole life on your computer and when your computer falls prey to a virus or is
hacked, you are completely at loss. To avoid this, you should make a smart move and use any
reputed online backup service for your files and documents. There are various services online,
which are trustworthy and you can make full use of them.

Follow these safety measures and be wary when interacting with unknown people on the
internet.

Categories: Security Tags:

Firewalls, Switches, Routers and VPN – Basics you must know

September 11th, 2011 No comments

These days, online businesses are going high on demand for their secure and safe business transaction methods. Now, there are so many people prefer to select the best networking device for a safe and secure business. If you want to do a business through online, then you need to look for these networking systems like firewalls, switches, routers and VPN.

Now, you can avail all sorts of information about these networking systems from online media. By collecting all the information about these firewalls, switches, routers and VPN networking systems, you can easily use these networking systems for your online business. The ethernet network & safety functions and saef remote connectivity to the industrial applications.

Having the problem to share internet in two and more PCs? You must try the BEFSR41. You may also connect to the modem as well as all PCs in the home and office will share internet. The BEFSR41 is a most widely used router, which has the 4 port switch as well as allows you attach the 4 PCs directly.

Also, it supports the DHCP server & UPnP (the universal plug n play). The router also allows file & printer sharing and you may share any of the file between the PCs like digital pictures, music, videos, as well as other documents. The Cisco RVS4000 4port Gigabit Safety Router – VPN and this is the inexpensive security router with the IPSec VPN capability.

The advanced firewall, authentication and encryption, features an suitable for the router behind configuration with the gigabit uplink, that fits gigabit networks very well. There is not any wireless capability in the router.

Cisco 120W WirelessN VPN Firewall

The wireless LAN device supports four separate wireless networks. That features the IP Security VPN support with the hardware acceleration. Also, it is appropriate for the branch office connections as well as remote client access. Cisco RV 120W gives 10 IPSec site tunnels as well as, gives 10 QuickVPN tunnels.

Categories: Security Tags: ,

Firewalls, Switches, Routers and VPN – Dedicated Appliance for Networks!

June 23rd, 2011 No comments

These days, every business holders are getting hugely dependent on quality communication network. Without information technology your businesses are most likely to be suffered. In this regard a firewall protection is much required for your network protection as it protect your internal and private LAN from the internet.

A firewall usually works at layer three and four of the OSI model where IP works and layer four is the transport layer.  This is a dedicated appliance to the network configuration and it is also much required for the network communication. It is keeps track of all going and incoming data of the network.

The switch is high speed multiport bridge and it is why the bridges are not longer required or manufactured. The switches do what bridges do faster & cheaper and most of the routers will as well function as the bridges.

You may ask how the hub fits in the mix of devices. The hub is multiport repeater and in other words, anything, which comes in a port of hub is duplicated as well as sent out other ports of hub, which have the devices attached.

Also, there is not any intelligence to how the hub functions. The switch is vast improvement over the hub in the terms of intelligence, for a lot of reasons.

Most important of the reasons is how bridge forwarding table actually works. The intelligent (and smart) switches have already made the hubs obsolete as they will do more at a same cost of the dumb hub. For this cause, hubs are used or else sold rarely any longer. In order, to see this bridge forwarding table on the Cisco switch type: show mac-address-table. Here is the example:

Firewall

The firewall is been used to protect more of safe network from the less secure network. Normally, the firewalls are been used to protect the internal or private LAN from Internet. The firewall normally works at the layer three and four of OSI model.

Categories: Security Tags:

Basic Linux Security for Beginners – Need to Understand the Basics!

June 9th, 2011 No comments

http://ubuntard.com/wp-content/uploads/2009/11/hackers0.jpgToday, safety is the prime concern in the online world. This type of issue can affect each and every person in several ways. These days, many system administrators are thinking to protect their system from unwanted applications and most importantly from hackers.

Now, there are several types of security packages available through which system users are protecting their system successfully. However, Linux is one of the best security packages among other security applications.

As per the present market scenario, Linux security package has managed to draw more importance from system users due to offer strong defense programs, and good services. If you want to take chance for using the Linux security at your system, then you need to understand basic things of the Linux. The basic of Linux security has described in the user’s manual which are available at online media.

Often, you can get the details about Linux security from web hosting service providers. At the time of installation of Linux in your PC, you don’t have to configure your windows. However, you will need an online connection at your system so that you can easily setup the Linux security in your system. The Linux security is directly connected to the TCP and IP protocol.

When the system is set up, then there are some routine tasks that will further improve the security: Remove mention of the Linux distribution as well as version numbers from the banner files such as /etc/issue as well as /etc/issue.net Add warnings regarding unauthorised use & logging to the system banners Configure the daemons that is named to listen on interfaces you would like them on.

In case, you actually want to nail down system, then consider installing & running the comprehensive system script such as Bastille Linux (http://www.bastille-linux.org/). It makes plenty of the detailed changes on the system.

As Bastille runs, that tells you what is it doing; you may select to skip some steps, however you can certainly learn much about the security all along way.

One of worst things that will happen is for the attacker to compromise the system, pilfer files, as well as then make use of system to launch attack on another victim, whereas you sit blissfully not aware of what is going on. In order, to ensure that the alarm bells ring while someone tampers with setup, then you must install the intrusion detection system.

Categories: linux, Security Tags: ,

Iptables – Get the Best Use of the Kernel Modules!

June 8th, 2011 No comments

http://files.placona.co.uk/iptables/iptables.jpgIptables is the user space application. It has also been considered as the application that can be used to organize the tables that are often created through Linux kernel Firewall. There are several benefits now users for iptables can get! They can get better control on the chains.

There are also few rules associated with the system to store its vital components. Before managing these rules and components was a major issue for the system administrators. But now things have been changed rapidly with invent of iptables. This sort of application is really making task easier for professionals by offering them a better control on their systems, chains and tables.

All you need to keep in mind that there are different types of kernel modules available. You can even take help of several programs to organize different protocols in a better way. If you are looking for the same sort of response, then it’s time to opt for the iptables. There are also several advantages which you can draw while using iptables. You can apply this sort of application for IPv4 and IPv6.

This sort of application is also allowing system administrators to have a better control on the arpatbales to ARP. All the tables are applied to packet, generally at the different stages in processing of packet; generally in every table just one chain is been applied to the packet, that depends on packet’s attributes. The Iptables is been used to set up, keep, as well as inspect tables of the IP packet filter that rules in Linux kernel.

Many different tables are defined. Every table has many built in chains as well as might as well have the user defined chains. Every chain is list of the rules that will match the set of packets. Every rule specifies what you can do with the packet, which matches. It is called ‘target’ that is a jump to the user defined chain in same table.

The firewall rule some specifies criteria for the packet, the target. In case, packet doesn’t match, next rule in chain is examined; in case, that does match, next rule is been specified by value of target that is name of the user defined chain and one of special values DROP, ACCEPT, QUEUE, and RETURN. List of the rules in chain is provided by command iptables -t table -L chain.

Categories: General, Security Tags: ,

Iptables – A poor man’s firewall

May 23rd, 2011 No comments

http://fireflier.sourceforge.net/qt_iptables.pngIf you are working as a system administrator and has always looked for a better application through which you can take proper control on the tables generated by Linux kernel Firewall, then it’s time to opt for the iptables.

This is a user space application which has been designed to help professionals like with their several needs. Now you can work confidently with several programs and kernel modules.

If you are a Linux user, then having a better control on the kernel modules and other protocols can really make your skill set enhanced. With the iptables like application you can easily manage the ebtables for Ethernet frame.

This sort of application always allows you to enhance the benefits for operating. All you need to keep in mind that the iptables needs to be used by the root users otherwise it may create more problems during the operation. There are a few rules that you need to keep in mind while trying to install iptables with your system.

Often the iptables will be documented with the man page and the system administrator can open it with the help of man iptables. iptables netfilter implementation at Linux 2.4 is very cute & elegant, however the documentation is at times incomplete & baffling.

It is in part as in Linux community few people appear to think that to write bafflingly code gives the satisfaction, as well as it is amusing to see some other people try and figure that out.

Foremost example of the attitude appears to me exceedingly clever & undocumented iprouting system; TC subsystem is particularly very subtle & few important details of are just available as the archived News messages of author.

There are a few bits of the documentation for the ip-routing (example 1, 2, and 6), however they are far from the complete and equal to task to illustrate the entirely novel & subtle routing architecture. The safety is the difficult process, which depends on to have the threat model & involves subjects a well as objects & access control between all of them.

Categories: linux, Security Tags:

Basic Linux Security for Beginners – Suitable For External and Internal Security Purpose!

May 13th, 2011 No comments

http://figs.cyberciti.biz/blogs/tips_tricks/synaptic-debian-package-manager-snapshot.pngFrom many users points of view security is just about disconnect the computer system from the network or switch off the connection. These processes may some how effective but never stand for long term process to secure the desktops and servers from the outside intrusion.

Now day’s million of computer users have used the internet, so it is much difficult for everyone to follow the process every time. In case of big companies or corporate sectors, they can manage the security system through the expensive firewalls as well as the experts IT staff.

However, it is so expensive process that never suitable for everyone. In this regard, proper planning and systems configuration may help the users to protect their computer system from the outside interference.

Due to these sorts of problem the user are looking for the basic Linux security for beginners. It is offering maximum security system to the users through its manual which us also guiding the user a lot with other modes of the application. Due to better security reasons, the Linux OS is vastly used by the software and networking developer to maintain their security. It is much suitable for both the external and internal security purpose.

In this regard, the users can keep their business and system safe. In spite of inherent safety of platform, Linux users must not be very complacent. Bookmark page, join mailing list, as well as learn how you can configure & use software! Try that with ‘n’ option to see the port numbers in place of the service names.

After that you may see which service is now listening on this port using ‘lsof’. For every service that you shut down, you would like to ensure that it is not started up once again on next system start. It is been accomplished in different methods under every distribution. Normally, what those tools are in fact, doing is making or else destroying the links in /etc/rc.d/rc#.d/ directories.

Let us now look at a few of the links now. Try command: ‘m asked whether the Linux is as safe as Windows. Do not ask me while I have the mouthful of coffee, since coffee stains are hard removing from a few fabrics. Wherever possible, ensure Internet exposed hosts not just save the logs locally, but they log to host, which is safely in firewall.

 

 

 

Categories: linux, Security Tags:

Security Basics on Linux for Beginners

May 5th, 2011 No comments

http://www.linuxtopia.org/LinuxSecurity/images/config_security.jpgLinux is one of the best security packages among others types of security packages. It can protect your system from hackers and unwanted programs. One of the best advantages of the Linux security is the hackers can’t the brake the code of Linux security that you offer at installation time.

These days, you can get the new version of Linux security at online media. If you want to use the Linux at your system, then you need to understand the basic about how to use. Linux can simplify the operating programs so that users can use their system easily. It is directly connected to the TCP and IP protocol.

When you are moving to install the Linux security on your system, then you need to offer a strong password. So, without you any one can’t open your confidential details in a system. It can manage more than 20 operating systems at a time.

At present, Linux security is the modern and powerful tool that can protect your confidential page in your website. However, to understand basic of the Linux security is not possible for everyone. If you want to use the Linux security package at your system. So, you need to understand the basic of Linux security, and you can get the basic information of the Linux at online.

Second problem is been solved just by moving passwords out of /etc/passwd as well as in /etc/shadow that is readable & writable only by the root. But, it is possible that unforeseen vulnerability in application and daemon somewhere can allow remote attacker get the copy of shadow password file.

In case, it happens, he may go to work on that with a cracking tool such as John the Ripper, Slurpie or Crack that perform the dictionary attacks as well as brute force attacks.

The serious attacker will afford to let run for days, however experience shows any weak passwords – the dictionary words and the derivatives (such as word spelled backwards) are turned up in some hours at a most.

Therefore, do not use the dictionary words as the passwords. Do not use information that attacker can find out regarding you and guess, like car registration, spouse’s name, pet’s names, and many more. As double check, make use of netstat -put command and see what daemons are now listening on the ports for the outside connections.

Categories: linux, Security Tags:

Basic Linux Security Tips to Protect Your System!

April 30th, 2011 No comments

Every computer users are concern about the security factor of their system. Therefore it is important to install a security packages on computer to save it from all hazards. For many tears Linux is providing some extra ordinary security packages for computers.

Linux provide many security packages for viruses and worm written for windows. Computers that are connected to the internet are the most vulnerable place for attackers. There are so many types of data recovery tools available that it doesn’t matter what Operating System was installed on the disk.

There are no golden rules for security. Security is such a thing that needs to be work upon and personalized. By installing Linux security packages you can make an attacker’s task difficult. By following some security tips you can surely protect your computers from attackers. The tips are the following.

  • Keep up with the security updates
  • Disable unnecessary services
  • Restrict root access
  • Don’t auto mount device
  • Don’t stay on the bleeding age
  • Don’t upgrade every six month

The main goal of Linux security packages to make sure you stay on the top of any security vulnerabilities. Due to several benefit Linux security packages are so popular among computers user.

This generally examines the network datagrams, searching for signatures of different common kinds of the attacks: CGI exploits, some kinds of the denial of the service attacks.

Maybe best known network IDS is Snort that is installed anything from the basic sniffer to sensor for comprehensive database- intrusion analysis system.

Big end of town is now making lots of noise regarding the intrusion prevention systems; and these are generally IDS’s with ability to automatically add the firewall rules that can block attack.

Linux world has this for many years in form of the PortSentry, application that is very hard to find on internet as company that made was taken over by the Cisco (however googling can turn that up). With the PortSentry installed, when somebody runs port scan & hits, say, port twenty, you may block the IP address.

Beauty of this is they can never figure you are running the vulnerable version of the SSH on a port 22 since they are all blocked prior to they get there.  In the firewall configurations, you may as well install the network intrusion system.

Categories: linux Tags:

Basic Linux security for beginners – Follow Some Tips to Protect Your System!

April 9th, 2011 No comments

Every computer users are concern about the security factor of their system. Therefore it is important to install a security packages on computer to save it from all hazards.

For many tears Linux is providing some extra ordinary security packages for computers. Linux provide many security packages for viruses and worm written for windows.

Computers that are connected to the internet are the most vulnerable place for attackers. There are so many types of data recovery tools available that it doesn’t matter what Operating System was installed on the disk.

There are no golden rules for security. Security is such a thing that needs to be work upon and personalized. By installing Linux security packages you can make an attacker’s task difficult.

By following some security tips you can surely protect your computers from attackers. The tips are the following:

  • Keep up with the security updates
  • Disable unnecessary services
  • Restrict root access
  • Don’t auto mount device
  • Don’t stay on the bleeding age
  • Don’t upgrade every six month

The main goal of Linux security packages to make sure you stay on the top of any security vulnerabilities. Due to several benefit Linux security packages are so popular among computers user.

This generally examines the network datagrams, searching for signatures of different common kinds of the attacks: CGI exploits, some kinds of the denial of the service attacks.

Maybe best known network IDS is Snort that is installed anything from the basic sniffer to sensor for comprehensive database- intrusion analysis system.

Big end of town is now making lots of noise regarding the intrusion prevention systems; and these are generally IDS’s with ability to automatically add the firewall rules that can block attack.

Linux world has this for many years in form of the PortSentry, application that is very hard to find on internet as company that made was taken over by the Cisco (however googling can turn that up).

With the PortSentry installed, when somebody runs port scan & hits, say, port twenty, you may block the IP address. Beauty of this is they can never figure you are running the vulnerable version of the SSH on a port 22 since they are all blocked prior to they get there. In the firewall configurations, you may as well install the network intrusion system.

Categories: linux, Security Tags: