You have created that huge destination set in order to block malicious sites. You think it is working great because Web Proxy clients can't access those sites. However, someday you discover that Firewall and SecureNAT clients still have access to those sites, despite the fact there is a proper Site&Content rule in place. If you want to know why this can happen, read on.
Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems are becoming increasingly important in helping to maintain proper network security.
What causes the buffer overflow condition? Broadly speaking, buffer overflow occurs anytime the program writes more information into the buffer than the space it has allocated in the memory. This allows an attacker to overwrite data that controls the program execution path and hijack the control of the program to execute the attacker’s code instead the process code. For those who are curious to see how this works, we will now attempt to examine in more detail the mechanism of this attack and also to outline certain preventive measures.
In this tutorial I will explain ISA’s SSL (Secure Socket Layer) bridging capabilities and features to give you a better understanding of this feature so that you can use it to strengthen your ISA infrastructure within your Networking environment.
Securing your network should be treated with the utmost priority. Knowing that your network is being attacked is a great advantage that will serve as a powerful tool. If your network security strategy is employed correctly you should not have a major challenge with intruders.
Many managers and network administrators believe that since they have a firewall constructed by security experts then they are protected from unwarranted attacks and can sleep well at night. Nothing could be further from the truth!
While looking through commercial offers for IDS products one may get the impression that in the near future, it will no longer be necessary to have an experienced administrator or security guru to monitor and maintain IT security systems. Already, the administrator’s role is seen as “a monkey with nothing better to do than push a flashing button”. Such a perception may be explained in terms of increasingly “intelligent” IDS solutions.
In this article we will look at Windows XP Professional and what you need to do to be secure. After reading this, you may be surprised about some of the items you may have taken for granted! Let's take a look…
In this article, we will look at Windows based Security tools that have always been heavily used on Unix based systems, and not used as often on Windows based systems.
As a network administrator, I’m sure you understand the critical nature of security event ID 529. Well, possibly not. If you have Windows 2000 auditing enabled, you’re probably very familiar with the incredible number of event types that you come across when viewing your Security logs.