Quantcast
Channel: Network Security – excITingIP.com
Browsing all 51 articles
Browse latest View live

What do you think of accessing blocked sites & hiding IP address using...

If you are a network admin, you might be aware of the various techniques used by students/ employees to gain access to blocked sites. Right from typing IP address instead of URL, using URL shortener’s,...

View Article



Why is an SSL Certificate required?

An SSL Certificate might be required mainly for two reasons – 1. To validate the identity of a website / portal using digital certificates; 2. Encrypt communications between server and browser (or)...

View Article

What is – MAC Address, MAC Filtering, MAC Spoofing

MAC Address or Media Access Control Address (physical address/ hardware address) is the permanent address embedded in NIC (Network Interface Cards) and Wireless Adapters. In this article, you can read...

View Article

What is a Trojan Horse in Computer Networks and how to protect yourself from it?

A Trojan Horse is a computer program that is attached to a genuine program / gets disguised as a genuine program to install a back-door to the user computer (enabling the attacker to take control of...

View Article

What are Network/ Internet Worms & A short story of Stuxnet

In this article, let us look at what computer worms are, some techniques used by them to infect systems, what they can do and how they spread. But before that, let us read a short story of the most...

View Article


Botnets – What are botnets, what can they do & how to protect against them

Botnets are automated computer programs that install themselves on many unsuspecting victim machines and launch coordinated attacks against target systems. Spam bot is a type of botnet, but there are...

View Article

What can Spyware do and How can one Protect against Spyware?

In the Internet era, one doesn’t have to physically access a phone line to tap communications and spy on others. They just need to incite someone to install a piece of software (called spyware) and can...

View Article

Computer and Network Forensics – An Introduction

Computer/Network Forensics is about finding out and collecting information about an online attack/security breach and presenting it in a way that is permissible in a court of law. Should IT managers be...

View Article


Flame Virus (Worm) – Some good resources to read to know more

Many of us might be familiar with Stuxnet, a major worm that was discovered in the Iranian nuclear facility. More recently the news about another major worm called Flame discovered in Iranian oil...

View Article


A Honeypot can be used as a Network Security tool

What is a honeypot? A honeypot is an isolated and vulnerable system that is deliberately kept in the network in order to attract attackers, study their method of attacks and protect the actual systems...

View Article

Penetration Testing – An Introduction

Penetration Testing is the name given to methodologies used to test networks, applications, and even people, for security holes. It is done by trained professionals who identify security...

View Article

Book Review: Malware, Rootkits & Botnets – A Beginner’s Guide

Malware, Rootkits & Botnets – A Beginner’s Guide, written by Christopher C. Elisan, offers a good introduction to information security. Written in a simple language, this book should be useful to...

View Article

Public Cloud: What Security Can your Business Expect?

Security concerns are often cited as a reason for not hosting enterprise applications/data on the public cloud. In this post, let’s have a glimpse at the level of security offered by AWS, a prominent...

View Article


Encrypted RDP for Non-Mobile Worker Remote Access?

When we think of remote access, we think of VPN. But is VPN the only option? Why not use encrypted RDP, especially for giving temporary remote access to non-mobile workers? VPN is Virtual Private...

View Article

Image may be NSFW.
Clik here to view.

Network Sandbox for Zero-day Attacks & Unknown Malware

Network Sandbox is a technology that enables organizations to analyze, identify and block zero-day attacks and unknown malware, even before a signature is created for them. Most protection methods...

View Article


Image may be NSFW.
Clik here to view.

Ransomware – An Introduction

What is Ransomware? Ransomware is a malware/malicious software program designed to block or disable access to the data your computer. The program displays a full-screen message on your screen claiming...

View Article

What is DNSSEC and Why is it Required?

DNSSEC (Domain Name Systems Security Extensions) is a set of protocols added to the DNS protocol to enhance security. It serves the following main functions – Authenticates and certifies that the DNS...

View Article


Internal Network Segmentation Firewalls: What are these?

What are Internal Network Segmentation Firewalls? Most firewalls are placed on the edge of the network, and with a good reason. But what happens once a threat/malicious code passes through into the...

View Article

Media Player Apps Can be used to Hack into a System?

Check Point, in its recent blog post, has reported a vulnerability in existing media player apps like VLC, Kodi, etc. using which an attacker can try and take complete control over a user’s system –...

View Article

How to Identify and Prevent Web Scraping Bots?

What are Web Scraping Bots? There are computer programs that automatically visit a website and copy information like content, price, etc. on some/all web pages and pass it on to its owners. These are...

View Article
Browsing all 51 articles
Browse latest View live




Latest Images