Trojan

Snort_inline as a solution

Using Snort_inline in many different environments and scenarios has proved to be a winning strategy to secure internal networks, DMZ networks or home networks. In order to work properly in the drop mode, it should adapt to the features of…

Robot wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can…

MD5 – Threats to a Popular Hash Function

MD5 is probably the most used one-way hash function nowadays. Its area of application starts with simple file checksums and propagates even to DRM (Digital Rights Management). Although serious openings within MD5 had been considered problematic, one of them was…