Et Cetera

Wed
03
Feb

A Comparison of VNC Connection Methods

Contributed by Frank Isaacs

VNC (Virtual Network Computing) is an open-source, cross-platform protocol for viewing GUI desktops on remote machines within a LAN or over a WAN/Internet connection. This paper discusses different methods of deploying VNC with a n emphasis on the security considerations of each method, and the tradeoffs associated with the convenience of each method. The methods discussed include an open connection and a connection tunneled over ssh (Secure SHell). Includes information regarding the platform-independence of VNC and ssh implementations, so that solutions presented can be applied to Windows, Linux, Mac, and even other operating systems – securely and with open-source software.

This document is in PDF format. To view it click here.

Fri
22
Jan

Firewall Technologies and Securing a Network Classroom Lab

Contributed by Thomas S. Adeimy

The transition from industry into academia meant not having total access to computer hardware and software resources. I was going to teach computer and networking courses, and could not wait to use my real life industry experiences as learning tools in a classroom/lab setting. It wasn’t long until my newfound enthusiasm began to be tested. I was an instructor, not a member of the campus IT staff. All the campus labs were general purpose computer labs. Computer desktops were “locked down” by group policies, Internet access was restricted by “Cyber Patrol” controls, BIOS settings were password protected. Access to the “Server Room” was protected by a keypad, and of course I was not given the password. These were just some of the things that began to make my life miserable as a computer instructor.

Thu
14
Jan

Firewalls for small business

Contributed by James Thomas

A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try to prevent unwanted information from entering your network. This applies to a home, small business, or a large corporation network. A firewall monitors all of the incoming and outgoing traffic (information) to the local area network. Notice that the firewall is located between your network and the Internet.

This document is in PDF format. To view it click here.

Thu
14
Jan

Firewalls for the Home & Small Business

Contributed by Gordon Giles

A firewall can be in the form of hardware, software or a combination of the two. It is basically used to prevent, block, and keep out unwanted intruders from entering a network. This applies to a home, small business, or a large corporation network. A firewall monitors all of the incoming and outgoing traffic from a personal computer or a local area network. The majority of people ar enot afraid of the Internet connection being hacked by an outsider. The chances of suffering from some type of Internet hack are on the rise, especially when connected to the Internet using a cable modem or some type of broadband service.

This document is in PDF format. To view it click here.

Thu
14
Jan

Threat Detection Evolution: What Practitioners Need to Know

Contributed by Securosis

Prevention isn’t enough, whether you deploy it on the network or endpoints or both. It’s not clear that it ever was, but there is additional proof every day that adversaries cannot be reliably stopped. We see the beginning of the long-awaited shift of focus and funding, from prevention to detection and investigation. But security practitioners have been trying to make sense of security data for years to shorten the window between compromise and detection… largely unsuccessfully.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera