Monthly Archives: August 2004

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

After the initial thrill of setting up your own wireless network is gone, you try looking into the ways of making it more secure. Common sense tells you that following the manuals on securing the network widely available on the Internet should help, but what if your responsibilities include managing an array of enterprise-level WLANs?… Read More »

Exploiting the Potential of Linux

Organizations today are struggling with how to expand their business and compete in the face of lean IT budgets. Doing more with fewer resources, optimizing systems and revitalizing IT infrastructures for greater efficiency and agility to respond to ever- changing business conditions remain at the top of many business leaders’ agendas.

Protection From the Perimeter to the Core

A decade ago, Internet security pioneer Bill Cheswick proposed a network security model that he famously characterized as a “crunchy shell around a soft, chewy center.” Today, as more and more “outsiders” – remote users, business partners, customers, contractors – require access to corporate networks, enterprises are finding the idea of a “soft center” obsolete,… Read More »

Red Hat Fedora Linux 2

Few people in the industry would ever acknowledge purchasing and reading the “For Dummies” books to expand their knowledge. Red Hat Fedora Linux 2 is a book written specifically with an average user in mind. Accompanied by a DVD that´s equivalent to 9 CDs from Fedora Core 2 (OS, tools and applications, source code, documentation),… Read More »

Vulnerability Protection: A Buffer for Patching

The purpose of this paper is to identify the problem facing the network security community regarding vulnerabilities and patches. It explains why current security technologies such as firewalls, intrusion detection and prevention systems, and automated patch management solutions have failed in preventing vulnerabilities from being exploited. Finally an alternative approach is proposed that incorporates and… Read More »

VPNs – Blessing Or Curse?

VPNs have recently moved on to become second generation technology. From having one or two VPNs, companies are now looking to install large numbers. These numbers are likely to grow steadily and in a few years’ time, organisations may potentially have thousands of VPNs. This proliferation brings undoubted benefits, but also some very major challenges… Read More »

Spam Blocking Techniques

Recent analyst estimates indicate that over 60 percent of the world’s email is unsolicited email, or “spam.” Spam is no longer just a simple annoyance. Spam has now become a significant security issue and a massive drain on financial resources. In fact, this deluge of spam costs corporations an estimated $20 billion each year in… Read More »

Automated Penetration Testing – False Sense of Security

The security industry has matured quickly over the past few years with penetration testing becoming one of the norms for organisations adopting best-practice processes. Loosely defined as the process of actively assessing an organisations security measures and completely reliant on consultancy services, security manufacturers have been eager to bridge the gap between product and service… Read More »

Risk and Realities of WLAN in the Enterprise

Businesses are embracing WLAN for many reasons, most commonly for the convenience it offers. No need for wires gives employees the freedom to work in common areas or from hard to reach places. Employees are also finding the convenience of remote working using WLAN from home and public hotspots.