Intrusion Prevention and Intrusion Detection Systems

Intrusion prevention systems (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profile—as in no profile at all. It should be common sense, but consider this: If instead of tiptoeing around a network, you slam … Read more

Firewalls

The firewall category includes proxy firewalls; however, because of a proxy’s varied functions it seems appropriate to give them their own subsection. Firewalls are most commonly broken down into the following main categories: Packet filtering Stateful packet filtering  Application proxies, which we covered earlier Packet filtering firewalls look at the header information of the packets … Read more

Proxies

Proxy servers work in the middle of the traffic scene. You may have been exposed to the forwarding side of proxies; for example, your browser at work may have been pointed to a proxy server to enable access to an outside resource such as a website. There are multiple reasons to implement such a solution. … Read more

Brain’s memory inspires neural networks to be less ‘forgetful’

Researchers say they have successfully addressed what they call a ‘major, long-standing obstacle to increasing AI capabilities’ by drawing inspiration from a human brain memory mechanism known as ‘replay’. Artificial intelligence (AI) experts at the University of Massachusetts (UMass) Amherst and the Baylor College of Medicine said they have developed a new method to protect – … Read more

Network Devices

Routers Let’s begin with routers. Our aim here is to give you a firm understanding of the basic functions of routers, so you’ll use this knowledge for more complex hacking techniques and tools. A quick overview of the fundamentals: a router’s main function is to direct packets (layer 3 traffic) to the appropriate location based … Read more