Articles tagged with security

  1. E-Commerce: Privacy and Security

    Posted on in IT Management

    Company X is a fictional manufacturer of gourmet snacks and treats.

    Studies have shown that a large number of Internet users are concerned about privacy and security. According to one study, 87 percent of Americans fear their credit card information will be stolen or misused. Additionally, 89 percent fear that …

  2. Camino 1.5.5 Says Me Too!

    Posted on in Software

    The Camino Project LogoAs you may know, Firefox 2.0.0.12 was released today, and it's no surprise that The Camino Project has followed suit with Camino 1.5.5. The Camino browser is a Mozilla-based web browser designed to integrate smoothly with Mac OS X. It sports a more OS X-like …

  3. Cisco's New ip verify unicast source reachable-via

    Posted on in Networking

    Regret (photo by xymonau) [id: 523790]Oops! I guess I'm way behind the times.

    For quite a while, I've been using ip verify unicast reverse-path to prevent packets with spoofed source addresses from crossing my routers. Apparently, as of IOS 12.0 (12.4 is current as of this writing), that command has been replaced with …

  4. Basic Cisco SNMP Security (v1/v2)

    Posted on in Networking

    Padlock with KeysIf you are at all familiar with <acronym title="Simple Network Management Protocol">SNMP</acronym>, you've probably heard of "community strings". Community strings are similar to passwords. They define and grant access to a device's <acronym title="Management Information Base">MIB</acronym>. If you've used SNMP in conjuction with a …

  5. Bye Bye BIND 8 (BIND 8 EOL)

    Posted on in Software

    Internet Systems Consortium, Inc., makers of the popular BIND <acronym title="Domain Name Service">DNS</acronym> server and INN Usenet server, has announced the End of Life for BIND 8 . I received an email from ISC on this topic earlier in the month, but I wasn't aware that the <acronym …

  6. Regex Crashes BGP Routers

    Posted on in Networking

    Cisco LogoThis isn't late breaking information, but there's an interesting post in the Cisco WAN, Routing and Switching Forum regarding a particular regular expression that, when used in conjunction with the show ip bgp regexp, results in a router crash. Here is the full command.

    show ip bgp regexp (.*)(_\1 …
  7. Securing Virtual Terminal (VTY) Lines

    Posted on in Networking

    Cisco LogoOne possible security risk on any Cisco-based network is the <acronym title="Virtual Terminal">VTY</acronym> lines of routers and switches. These lines are used for remote access (via telnet, by default) and are prime targets for remote brute force password attacks. There are a few simple steps you can …

  8. Defining Management IPs in Cisco IOS

    Posted on in Networking

    Cisco LogoOn most networks, there is a subset of IP addresses assigned to "management" hosts. These hosts might be the workstations of network administrators or monitoring servers. One of the keys to network security is restricting who has access to the device. Generally, we think of access restriction in terms of …

My Bookshelf

Reading Now

Other Stuff