New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO9)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 562
Comments: 14
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: Networks

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image Threat Assessment: Linksys Router External Sniffing? image
Networks
I read a report today from The Inquirer that purports Linksys (now owned by Cisco) hasn't updated their firmware to popular products such as the BEFSR41 for a year now. The article was published today based on an exploit released by Jon Hart that claims via BOOTP can be used to crash or sniff Linksys devices remotely.
Posted by Paul  on Wednesday, 02 June 2004 @ 10:27:15 EDT (214 reads)
(» Read More... | 1048 bytes more | TrackBack (0) | 2 comments | Threat Assessment | Score: 0)
image

image WeekEnd Feature: Bombproof? image
Networks

WeekEnd Feature: Bombproof?












by Ian Thompson, CCSP Staff Editor
April 3, 2004


If your information were vital, how far would you go to ensure it gets to where it is needed? How much would you invest to create a backup route? I know its all a matter of cost (or more specifically it’s a matter of cost-benefit analysis), but the costs are falling and perhaps it’s time to assess things again.
Posted by phoenix22  on Saturday, 03 April 2004 @ 09:18:36 EST (1151 reads)
(» Read More... | 9460 bytes more | TrackBack (0) | 5 comments | WeekEnd Feature | Score: 5)
image

image Feature Opinion: Staffing for security: Mission-critical positions image
Networks

Opinion: Staffing for security - Mission-critical positions







by Marcia J. Wilson, CCSP Staff Writer
March 16, 2004


"Reprinted from March 25, 2K3"

Staffing for security positions is a dilemma. Organizations are searching for the right mix of technologists and managers to meet the demands of securing networked computing environments.
Posted by cj  on Tuesday, 16 March 2004 @ 10:00:00 EST (918 reads)
(» Read More... | 6300 bytes more | TrackBack (0) | comments? | Feature Opinion | Score: 0)
image

image Feature Opinion: Network Security-Best Practices image
Networks

Opinion: Network Security-Best Practices







by Marcia J. Wilson, CCSP Staff Writer
March 9, 2004


"Reprinted from January 27, 2k3"

Advice by Marcia J. Wilson

Believe it or not, best practices in network security begin with a top-down policy. Policy begins with understanding what it is you need to protect and what it is you need to protect against. The levels of responsibility need to be understood, and that implies that security is everyone's job, as each employee understands how he or she contributes to the organization. Best practices in network security are more about the what and why of securing the organization's information assets than about the how.
Posted by cj  on Tuesday, 09 March 2004 @ 10:00:00 EST (650 reads)
(» Read More... | 7955 bytes more | TrackBack (0) | comments? | Feature Opinion | Score: 5)
image

image New Technology\Prods: Network Box: Real Time Network Security image
Networks
Network Box: Real Time Network Security

First security product to block encrypted Zip file viruses at the gateway
Stops ploy used by Bagle virus

4th March 2004

Network Box, an Internet security vendor, today announced an industry first: gateway-level anti-virus protection to scan inside password-protected Zip files. This blocks a technique used by the Bagle virus to infect the computers of unsuspecting users.
Posted by phoenix22  on Thursday, 04 March 2004 @ 10:58:55 EST (403 reads)
(» Read More... | 3512 bytes more | TrackBack (0) | comments? | New Technology\Prods | Score: 5)
image

image Feature Opinion: How to develop blueprints for network security image
Networks

Opinion: How to develop blueprints for network security.







by Marcia J. Wilson, CCSP Staff Writer
March 4, 2004


"Reprinted from February 27, 2k3"

A blueprint is a detailed plan or program of action. When thinking in terms of a network security blueprint, one would think of the overall architecture first and then the individual components of the system. Oftentimes, we focus on individual technologies such as a firewall or intrusion-detection system. Everyone needs a firewall, right? Wrong. The firewall will do absolutely no good if security can be breached through a poorly configured virtual private network (VPN) connection or if you have a disgruntled employee who has access to critical information systems.
Posted by cj  on Thursday, 04 March 2004 @ 10:00:00 EST (695 reads)
(» Read More... | 7918 bytes more | TrackBack (0) | comments? | Feature Opinion | Score: 0)
image

image Announcements!: Cisco, Anti-virus Vendors Team on Network image
Networks
Cisco, Anti-virus Vendors Team on Network Security
By Dennis Fisher

LAS VEGAS—Cisco Systems Inc. on Tuesday announced partnerships with several anti-virus vendors to license the company's new Trust Agent technology to help enforce network access control policies. The partnership is part of a new program at Cisco, called Network Admission Control, that is designed to help prevent unprotected devices from connecting to corporate networks.

Posted by phoenix22  on Wednesday, 19 November 2003 @ 04:40:00 EST (318 reads)
(» Read More... | 2359 bytes more | TrackBack (0) | comments? | Announcements! | Score: 0)
image

image Beware!: Web hijack riles Belkin router users image
Networks
Web hijack riles Belkin router users
By Declan McCullagh
CNET News.com

Belkin is trying to defuse a potentially explosive situation that arose after network administrators learned that the company's wireless routers periodically hijack users' Web connection and display an advertisement for its software.
Posted by phoenix22  on Tuesday, 11 November 2003 @ 04:25:00 EST (816 reads)
(» Read More... | 2876 bytes more | TrackBack (0) | 1 comment | Beware! | Score: 5)
image

image Vulnerabilities: Worming out the truth image
Networks
Worming out the truth
In the face of vendor denials, it pays to stick to your hunches.
By Vanessa Watkins

We had been, in the main, happy with our ATM network, with its 155Mbps backbone and its mixture of 10/100Mbps switches and 10Mbps hub-stacks. It had been in operation for some years. Now, for the reasons acknowledged by the rest of the planet, it was time to upgrade to Gigabit Ethernet.


Posted by phoenix22  on Sunday, 09 November 2003 @ 04:45:00 EST (250 reads)
(» Read More... | 4555 bytes more | TrackBack (0) | comments? | Vulnerabilities | Score: 0)
image

image Security Tips/Tools: Wired or Wireless? Choose Your Network image
Networks
Wired or Wireless? Choose Your Network
Getting connected is a fast, cheap affair. Here's how to decide which network is right for you.
Scott Spanbauer

You probably recognize this scenario: As everyone in the house or in a small office gets their own computer, each wants to connect to the printer, phone line, or high-speed Internet connection. They may even want to collaborate on or view the same files. What's a buzzing hive of computerized folk to do?
Posted by phoenix22  on Tuesday, 04 November 2003 @ 04:45:00 EST (622 reads)
(» Read More... | 11592 bytes more | TrackBack (0) | comments? | Security Tips/Tools | Score: 4)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication