+

Tagged With / 'hakin 12/2007'

December 12, 2007


How spam is sent

Spammers often use insufficiently secured systems. The trouble and cost of sending tens or hundreds of thousands of messages are transferred to third parties. You will learn what techniques spammers use and how to protect yourself. Author: Tomasz Nidecki Source: https://hakin9.org Hakin9 12/2007 What you will learn… how spammers send spam (using third party computers), how to protect […]

Read more

December 12, 2007


Dangerous Google – searching for secrets

Information which should be protected is very often publicly available, revealed by careless or ignorant users. The result is that lots of confidential data is freely available on the Internet – just Google for it. Author: Michał Piotrowski Source: https://hakin9.org Hakin9 12/2007 What you will learn… how to use Google to find sources of personal information and other […]

Read more

December 1, 2007


Knock Knock Knocking On Firewall’s Door

Firewall technologies today are still a critical component to protect systems and networks. Standard filtering solutions can be complemented with more advanced techniques to secure the services behind a firewall. Author: Raul Siles Source: https://hakin9.org Hakin9 12/2007 What you will learn… How to deploy fwknop (an open-source SPA implementation) using FC6 Linux, The in-depth knowledge about technologies presented […]

Read more

December 1, 2007


Introduction to Firewall Rulebases

Firewalls – We have all heard of them in some way or the other and most of us have worked on them as well. Although prevalent to our network security infrastructure, not a lot of us in the IT world have taken the time, or had the opportunity to learn more about the firewalls that […]

Read more

December 1, 2007


Introduction to Firewalls: From ISO/OSI to DMZ

I’ve been using, configuring and administrating firewalls for at least 3 years, in which I’ve seen and tested the most used of those like Iptables, BSD’s PF, Ipfilter, Checkpoint, common firewalls in embedded devices, and almost all software firewalls. Author: Michele Orrù Source: https://hakin9.org Hakin9 12/2007 What you should know… TCP/IP basics, classic IP packet structure, computer networks […]

Read more

December 1, 2007


Pharming – DNS cache poisoning attacks

Visiting online banking services and other secured sites is becoming increasingly dangerous. Entering your credit card number on a website which looks deceptively similar to that of your bank might end with a considerable sum disappearing from your account. Unfortunately, such attacks are increasingly commonplace nowadays and make use of a new method called pharming. […]

Read more

December 1, 2007


Voice over IP security – SIP and RTP protocols

Voice Over IP (VoIP) is one of the hottest buzzwords in contemporary IT, even more so since the last CeBit in March 2005, and a new hope for both service providers and device manufacturers. Countries with good network infrastructure typically have several offers of VoIP bundles, consisting of a hardware router with VoIP functionality and […]

Read more

December 1, 2007


Robot Wars – how botnets work

One of the most common and efficient DDoS attack methods is based on using hundreds of zombie hosts. Zombies are usually controlled and managed via IRC networks, using socalled botnets. Let’s take a look at the ways an attacker can use to infect and take control of a target computer, and let’s see how we […]

Read more

December 1, 2007


Internal penetration tests

Penetration tests are one of the techniques used to expose holes in the security of an IT system. They are carried out by simulating the actions of a potential intruder. Since they are supposed to resemble what could happen in case of a real attack, they should encompass as many known system penetration methods as […]

Read more

December 1, 2007


Bluetooth connection security

Bluetooth is rapidly gaining popularity throughout the world, with some 1.5 billion devices expected to support the technology by the end of 2005. However, Bluetooth can also be used for malicious purposes, such as snooping into private data, causing financial losses or even locating the device owner. Author: Tomasz Rybicki Source: https://hakin9.org Hakin9 12/2007 What you will learn… […]

Read more

December 1, 2007


Safe storage of confidential data under GNU/Linux

The only way to guarantee safe storage of data is to use advanced cryptographic algorithms. There are Linux tools which allow the encryption of single files, directories and even whole partitions. Let’s have a look at the methods of encrypting important data. Author: Piotr Tyburski Source: https://hakin9.org Hakin9 12/2007 What you will learn… how to ensure data is […]

Read more

December 1, 2007


Man in the Middle Attacks

A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims. Author: Brandon Dixon Source: https://hakin9.org Hakin9 12/2007 […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa