Cybersecurity

Hidden Backdoors, Trojan Horses and Rootkit Tools in a Windows Environment

Not every case of a successful intrusion is “crowned” with a replaced Web site on the server, data theft or damage. Often electronic intruders do not wish to create a spectacle but prefer to avoid fame by hiding their presence on compromised systems, sometimes leaving certain unexpected things. They use sophisticated techniques to install specific “malware” (backdoors) to let them in again later with full control and in secret.

VPN Client Security Part 2: Forcing Firewall Policy on VPN Clients

Most of us put together a VPN to allow external network clients secure access to the private network. We usually think of the VPN Server as a security device that protects the internal network from external attack. In reality, the VPN Server is just a Remote Access Server that allows RAS clients to use the Internet instead of the Public Switched Telephone Network as the transit network. You've got to force firewall policy on VPN clients or else you'll suffer the consequences.

Securing Windows 2000 Active Directory (Part 2)

Protecting active directory’s integrity is paramount. This is the second article in the two part series that focuses on active directory security. Active directory is the windows 2000 information repository that needs to be kept very secure. Active directory has vital service dependencies such as DNS which changes the scope of what needs to remain secure. I will focus on actions that you can take in order to safeguard the active directory service.

Stop Virus Downloads with GFI’s DownloadSecurity

Are you tired of users downloading viruses, worms, trojans and scumware onto your network? Are you tired of conducting software audits on your workstations only to find a week later that same crud on your users desktops? If so, then you need to check out DownloadSecurity and see how it blocks users from downloading malware and viruses and puts you back in control

Combat intruders with GFI’s latest release of LANguard S.E.L.M.!

Each day the threat to the security of a corporate network increases and exploited vulnerabilities seem to multiply exponentially. A breached enterprise network can yield trade secrets, expose core business functions or have its information destroyed by intruders bent on profit, mayhem and mischief. In-depth defense is the only solution to this problem in an increasingly interconnected world – and surveillance is the first bulwark of defense.

Securing Windows 2000 Active Directory (Part 1)

Protecting active directory’s integrity is paramount. This article will focus on active directory security and will be written in two parts. Active directory is the windows 2000 information repository that needs to be kept very secure. Active directory has vital service dependencies such as DNS which changes the scope of what needs to remain secure. I will focus on actions that you can take in order to safeguard the active directory service.

Risk Assessment and Threat Identification

Although you’ve gathered a considerable amount of data to this point, you will need to analyze this information to determine the probability of a risk occurring, what is affected, and the costs involved with each risk. Once you’ve identified the risks that can pose a probable threat to your company, and determined how much loss can be expected from an incident, you are then prepared to make decisions on how to protect your company.

The Mystery of the HTTP Redirector and Site&Content Rules

You have created that huge destination set in order to block malicious sites. You think it is working great because Web Proxy clients can't access those sites. However, someday you discover that Firewall and SecureNAT clients still have access to those sites, despite the fact there is a proper Site&Content rule in place. If you want to know why this can happen, read on.

Scroll to Top