Securing the .rhosts and hosts.equiv Files

Linux    —    and    all    the    flavors    of    UNIX    —    are    file-based    operating    systems.    Practically everything    that’s    done    on    the    system    involves    the    manipulation    of    files.    This    is    why    so many    attacks    against    Linux    are    at    the    file    level. Hacks    using    the    hosts.equiv    and    .rhosts    files If    hackers    can    capture    a    user    ID    and    password    by   … Read more

Cyber Security

Cyber security measures are associated with managing risks, patching vulnerabilities and improving system resilience. Key research subjects include techniques associated with detecting different network behavior anomalies and malware, and IT questions related to IT security. Since these research subjects mainly concentrate on the physical, syntactic and semantic layers, present research infrastructures are focused on studying … Read more

Commercial software: Not cheap, but has maintenance

The other option for running VM software yourself is to use commercial software. Most people automatically think of commercial software as a ‘safe’ option, and it usually constitutes the bulk of installed applications. But commercial software has drawbacks, so consider these points: Commercial software costs real money. You have to buy it, and that requires … Read more

Open Source software: Free, but not cheap

Open Source software is usually developed in an open, collaborative manner. The software is typically free, and users are able to use, change, improve, or share it. However, three considerations about Open Source software don’t bode well for use with VM: Questionable code. Open Source code is developed by the public, and you can’t be … Read more

Run Software Yourself

Software-based solutions enable you to install software for vulnerability management on your internal network and run them yourself. Software can automate many processes for VM. However, having the control over VM software carries the usual price tag of having to manage it (and secure it). You have to successfully operate and maintain everything – in … Read more

Identifying the vulnerability shortlist

The VM solution you select needs to provide the capability to scan for and fix vulnerabilities in a broad range of categories, including: Back Doors and Trojan Horses (bypass authentication systems).  Brute force attacks (defies cryptography by systematically trying different keys). CGI (exploits the Common Gateway Interface). Databases. DNS and Bind (exploits Domain Name … Read more

Detecting and Removing Vulnerabilities

Vulnerability management has evolved from simply running a scanner on an application, computer, or network to detect common weaknesses. Scanning is an essential element of vulnerability management, but VM includes other technologies and workflow that contribute to a bigger picture required for controlling and removing vulnerabilities. The primary objectives of VM are to:  Identify … Read more

what is assembly level programming language?

An assembly language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that are implemented directly on the physical CPU. Assembly languages generally lack high-level conveniences such as variables and functions, and they are not portable between various families of processors. They have the same … Read more

what is machine level programming language?

Machine language is the lowest-level programing language which is only understandable by computers. Which consists of binary or hexadecimal instructions which a computer can understand. Just as “10101001”. Kinda weird ha! As humans cannot understand the low-level language so we use high-level languages which are completely understandable by humans because of high-level languages are just … Read more