networksecurity2008.blogspot.com
Network Security And Threats: Maliciously-Coded Web sites
http://networksecurity2008.blogspot.com/2009/01/6-maliciously-coded-web-sites.html
Network Security And Threats. In addition to stealing personal information, maliciously-coded websites are also often designed for the following purposes:. Adware/ spyware/ reading cookies. XSS - cross- site scripting to utilize web browser flaws for other intentions. Subscribe to: Post Comments (Atom). Http:/ pics4u2010.blogspot.com. Http:/ 2009os.blogspot.com/. Zombie Computers and Botnets. Hardware Loss and Residual Data Fragments. How to find an infected computer? Zombie Computers and Botnets.
networksecurity2008.blogspot.com
Network Security And Threats: HOAXES
http://networksecurity2008.blogspot.com/2009/02/hoaxes.html
Network Security And Threats. It generates a false alarm by reporting the existence of a trick. It generates a false alarm by reporting that a virus that does not. It tries to get users to forward the message with the false promise. Copa del Mundo 2006. It generates a false alarm by reporting that a virus that does not. It generates a false alarm by reporting that a virus that does not. Hoax/Tsunami in South Asia. It appeals to well-meaning users trying to get them to forward the. Frog and Fish warnings.
networksecurity2008.blogspot.com
Network Security And Threats: Khatra.exe
http://networksecurity2008.blogspot.com/2009/02/khatraexe.html
Network Security And Threats. Khatra.exe (Khatra) Trojan Virus File Information. Khatra.exe is a dangerous file which creates activities on a user’s computer which may be highly undesirable. This file is unsafe. Location: C: WINDOWS system32 khatra.exe. It can make unexpected changes to your system. It can disable control panel and creates a file in each folder of your drive. This file may be of size 600 kb thus filling half of. It also runs in. Task manager and uses. It spreads mainly through pen drives.
networksecurity2008.blogspot.com
Network Security And Threats: Trojan Horses
http://networksecurity2008.blogspot.com/2009/01/2-trojan-horses.html
Network Security And Threats. Trojans typically do one of two things: they either destroy or modify data the moment they launch, such as erase a hard drive, or they attempt to ferret out and steal passwords, credit card numbers, and other such confidential information. Subscribe to: Post Comments (Atom). Http:/ pics4u2010.blogspot.com. Http:/ 2009os.blogspot.com/. Zombie Computers and Botnets. Hardware Loss and Residual Data Fragments. How to find an infected computer? Zombie Computers and Botnets.
networksecurity2008.blogspot.com
Network Security And Threats: Current Scenario
http://networksecurity2008.blogspot.com/2009/01/conclusion.html
Network Security And Threats. As the volume of financial and other data transactions increase over the Internet, the potential for harm from network threats also increases. As a consequence, complex security measures that were once required by only Fortune 500 companies such as regular security audits are increasingly a necessity even for the smallest of companies. Subscribe to: Post Comments (Atom). Http:/ pics4u2010.blogspot.com. Http:/ 2009os.blogspot.com/. Zombie Computers and Botnets.
networksecurity2008.blogspot.com
Network Security And Threats: Password Attacks
http://networksecurity2008.blogspot.com/2009/01/7-password-attacks.html
Network Security And Threats. A 'Password Attack' is a general term that describes a variety of techniques used to steal passwords to accounts. Packet sniffers:- Packet Sniffers glean data electronically from a compromised network. IP-spoofing:- Similar to 'Honeypots', this attack involves the interception of data packets by a computer successfully pretending to be a trusted server/ resource. Subscribe to: Post Comments (Atom). Http:/ pics4u2010.blogspot.com. Http:/ 2009os.blogspot.com/. Enter your email...
networksecurity2008.blogspot.com
Network Security And Threats: Hardware Loss and Residual Data Fragments
http://networksecurity2008.blogspot.com/2009/01/8-hardware-loss-and-residual-data.html
Network Security And Threats. Hardware Loss and Residual Data Fragments. Over the past few months, a number of government laptops have been stolen and the story has made national news. The government is so concerned, not because of the cost of replacing a few laptops, but from the network vulnerabilities that the loss of this hardware threatens to cause. In fact, hardware loss is a large cause of the more than 10 million cases of identity theft suffered by Americans each year. Develop a policy for keepin...
networksecurity2008.blogspot.com
Network Security And Threats: Firewall
http://networksecurity2008.blogspot.com/2009/02/firewall.html
Network Security And Threats. There are several types of firewall techniques:. Packet filters: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules.Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses. For instance, a firewall can...
networksecurity2008.blogspot.com
Network Security And Threats: ATTACKS IN LINUX
http://networksecurity2008.blogspot.com/2009/02/attacks-in-linux.html
Network Security And Threats. Attacker attempts to plant Trojan in Linux. An unknown intruder attempted to insert a Trojan horse program into the code of the next version of the Linux kernel, which is stored in a publicly accessible database. The changes, which would have introduced a security flaw to the kernel, never became a part of the Linux code and, thus, were never a threat, said Larry McVoy, founder of software company BitMover and primary architect of the source-code database BitKeeper. An intru...
networksecurity2008.blogspot.com
Network Security And Threats: February 2009
http://networksecurity2008.blogspot.com/2009_02_01_archive.html
Network Security And Threats. How to find an infected computer? Here are the symptoms of an infected computer:. The first thing you should do is to open the task manager.You can open it by right clicking on the task bar and select it. In the task manager you can see the performance of your computer, processes that are running etc. My Win XP task manager looks like this. SvchostAnalyzer, rkill etc. Some common process in XP are csrss.exe, ctfmon.exe, explorer. Exe, smss.exe, spoolsv.exe, svchost. Search f...