If you use direct Ethernet connection, you have to keep very little thing in mind to be always in safe side. However, if you use Wi-Fi router, you may have to take few more steps to make your WiFi connection secure. Almost all WiFi routers come with a basic security that prevents others from using … Read moreHow to Prevent Others from using Your WiFi using Mac Filtering
In my previous two articles I showed you how to secure your LAN and WLAN. In that i had mentioned the firewall factor. In this article I am going to show you the uses of firewall and its administration. Firewall Administration is ensuring the proper management, configuration, and change management of it.It is comprised of … Read moreWhat is Firewall Administration?
In my previous article i showed you the tricks and techniques to protect your LAN connection. In this article i will show you how to secure your Wireless LAN. As in the previous article LAN security was sub divided into two parts, similarly Wireless LAN security is also divided into two parts. The difference is in the security issues.
In thi short tutorial where you will come to know the basics of LAN security. As far as LAN security is concerned firewalls, anti-viruses play an important role in it. Viruses can affect your pc or your entire network. Hence it is very important to ensure that your connection is secure. Security of LAN is sub-divided in two parts.
Hey guys its not magic but its an indeed fact. It is a practice of communication between two or more computers with a very varied concept.It can be classified along with variety of concepts, right from basic to the very advanced classification. Networking is useful in sharing resources, communicating with each other, sharing information etc. … Read moreBuild your Own Network at Home | Learn Networking Series
Input Validation Attacks: It is one of the very ‘easy to implement’ attack. It injects malicious scripts into an application and by running such application the system can be attacked and it becomes vulnerable. It is even hard to defend than passive attacks. Following are some of the best countermeasures against input validation attacks: Application … Read moreHow To Defend An Input Validation Attack
Passive attack gathering is one of the Pre-attack stage where attacker collects information about his victim. It is also known as footprinting.This attack is done on big organization having very large network. It is the method by which we collect information about structure under organizational network. We sort of predict the flow of network by … Read morePassive Attack Gathering and the Tools Required
One of the most convenient methods of securing private data is using ‘‘Replicated services”. This method is actually done for backing up your data. We have to create two or more systems (or networks) having same function. These are used for performing same work. Both the systems are exact replicas of each other. Advantages: 1. … Read moreNetwork Security: Replicated Services (For Corporates)
Trojans History: According to the history, Trojans are the most harmful tool ever developed by the hackers, Back in 1998 the first Trojan named subseven was released and created a new history in the world of hackers. How Trojans Enter into System? Trojans actually comes from the file with dual extensions. Dual extensions mean one … Read moreWhat are Trojans? – History, Prevention, Explanation