Honeypots
One of the more interesting systems you will encounter is a honeypot. A honeypot may sound like something out of
Read moreIT Security
To determine a type of firewall and even a brand, you can use your experience with port scanning and tools
Read moreNot all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how
Read moreSignature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse
Read morewhat type of activities are indications of a potential attack? What type of actions can an IDS respond to? Let’s
Read moreThe main purpose of an IDS is to detect and alert an administrator about an attack. The administrator can then
Read moreThe first type, and one of the most common, is the NIDS. The NIDS is designed to inspect every packet
Read moreAn intrusion detection system (IDS) is an application or device used to gather and analyzev information that passes across a
Read moreAnother wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to
Read more