Sunday, August 27, 2006

Weekend Reads

Search Engine Hacking

Much like MSN hacking, and the ever popular Google hacking, Yahoo! as well exposes really cool data in the same way that MSN and Google does. Now that all three major search engines provide the same interesting data, information security people need to be aware of what is stored in the Yahoo! URL database as well. The process of using search engines for targeting and profiling vulnerabilities within search engines is common across all the big three.

Read the article HERE.

================================================================== WiFi Is Not A Simple Replacement For Ethernet

If you have a network of computers, and tire of running Ethernet cables, I'm sure you've thought of replacing the Ethernet cables with WiFi. But WiFi cannot replace Ethernet. The total bandwidth of a WiFi LAN is limited. You have to protect your LAN from your neighbors. And noise, both analogue and digital, will further reduce your bandwidth.

Read the article HERE.

================================================================== 'Hacker-In-A-Box' Tests Attack Scenarios

Few "ethical" hackers can provide simulated attacks with the level of sophistication that Cenzic offers in its Hailstorm "hacker-in-a-box" penetration tester.

Hailstorm's unique non-signature based technology interprets results during realtime attacks without comparing results with signature-based databases. The tool's interpreting engine eliminates false positives by providing generic solutions to attacks.

What's more, Hailstorm doesn't focus on any specific vendor's technology, since it uses generic scripts to attack different kinds of applications. Santa Clara, Calif.-based Cenzic provides all the source code for its attacks so that anyone can copy them and create their own scenarios.

Read the article HERE.

================================================================== How to set up WPA2 on your wireless network

If you are like most people, your home or small office wireless router probably is running without any encryption whatsoever, and you are a sitting duck for someone to easily view your network traffic. Some of you have put encryption on your wireless networks but aren't using the best wireless security methods. This means that you are running your networks with inferior protocols that offer a false sense of protection because these protocols are very easily broken into. It is the difference between using a deadbolt and a simple lock on your front door.
Read the article HERE.

================================================================== Online spy plan raises fears over privacy

Powerful, intrusive new technology is about to be used to spy on New Zealanders online. The software, developed to hunt movie pirates, can track internet searches in what an international privacy watchdog says is an alarming intrusion. It can trace Google searches and other download attempts back to the computer they came from.

Read the article HERE.

0 Comments:

Post a Comment

<< Home