Popular Posts

Thursday 13 December 2012

Network Security Video Notes: Secure Your Future

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Video Notes: Secure Your Future

When your network goes down, you can lose a lot more than just your information. Having a way to effectively secure your network and your physical business location is crucial to ensuring a perpetually productive and successful business.

Secure Your Future


Watch Secure Your Future Video:


Watch The Future of Computer Security

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Wednesday 14 November 2012

Network Security Video Notes: Watch The Future of Computer Security

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Video Notes: Watch The Future of Computer Security

Brad Templeton, chairman of the board of the Electronic Frontier Foundation (EFF), describes the future of online security, privacy and society. This lecture is from Singularity University's Graduate Summer Program 2009.

The Future of Computer Security


Watch The Future of Computer Security:


Watch The Future of Computer Security

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Friday 2 November 2012

Network Security Videos News: Internet Blocked In China During 18th Congress

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Internet Blocked In China During 18th Congress

The CCP's 18th Congress is approaching, and the ramped up
security work has spread to the network.
The China's MIIT claimed, in order to ensure the telecom
network security during the 18th Congress,
a nation-wide network blockade will apply from November 7
to the end of the 18th Congress.
Some analysts pointed out that the
Chinese Communist Party (CCP) is testing people's reaction.
A network blockade is to ensure the smooth flow of the network
on the surface, but the essence is to strengthen the monitoring of the network.

According to the China IDC Circle website news, the network
blockade from MIIT has made certain requirements.
First, to implement a "person in charge" in all units and
all levels to ensure a smooth 24-hour contact among relevant persons
so that if anything should happen, they can
quickly report to their superiors.

In addition, it requires all provinces, autonomous regions,
and municipalities directly under the Central Government
to strengthen the supervision and management of the safe
operation of telecommunications networks in the area.
as well as safety production and interoperability.
Any violators who affect the operation of the network security
and interoperability will be severely punished.

In this regard, Hu Jun, "Rights Movement" network manager,
commented, to ensure smooth network traffic
is the surface reason, in reality, it is to strengthen monitoring
of the network.

"Rights Movement" network manager Hu Jun:
"Just for a few days of meetings, you block everything?
What are you afraid of?
Online communication is normal for citizens.
Who are your enemies and what are you so afraid of?
To protect the 18th Congress? Why do you need to protect it?
From your establishment to the present,
you always make sneaky moves.
If the Party were legitimate,
you should not be afraid of the public."

Hu Jun said that the 18th Congress is an assembly
for transferring power.
Only when you do something not righteous,
will you be afraid of letting people know.

Hu Jun: "The handover of power itself involves the issue
of dividing up interest.
This is a very clear problem, re-dividing the blood
and sweat of the Chinese people.
This process is not any different than the mafia's style.

No one knows yet so far what would happen to the wealth
from Xilai's corruption."

Columbia University visiting scholar Gu Chuan said that
the CCP Internet blockade is normal.
It strengthens the blockade during the 18th Congress.

Gu Chuan: "In the report, it states maintaining smooth
contact 24 hours a day, including with other websites.
They asked the websites to be ready for 24-hour emergency.

However, the CCP will certainly strengthen
network blockade during the 18th Congress.
Its purpose is to prevent people from knowing what people
overseas think of the 18th Congress."

Gu Chuan also added that there is no truth in China
and "truth" is monopolized by the CCP officials.
The messages of truth circulating on the network
will be quickly deleted.

Gu Chuan: "In addition to the truth about the persecution
of Falun Gong and the repression of democracy activists,
there is also the political struggles within the Party, princelings,
and factions, including the collusion between Zhou Yongkang and Bo Xilai.
The CCP does not want people to know any of these,
so during the two sessions it will strengthen the blockade."

Some analysts pointed out, the news of the "network blockade"
was not disclosed by "Xinhua News Agency" or "People's Daily."
It was by the semi-official "21st Century Financial Network."
It is estimated that the CCP wants to test the public reaction.
But in any case, as long as anything important occurs during
the 18th Congress, the CCP is bound to take some measures.
That means telephone, telecommunications, networks,
and other public dissemination tools will be cut off.

Watch Video: Internet Blocked In China During 18th Congress

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Network Security News: Huawei and ZTE pose national security threat, US committee finds

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Well as you may already know:

Huawei Technologies Co. Ltd. is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen, Guangdong, China. It is the largest telecommunications equipment maker in the world, after having overtaken Ericsson.

Huawei was founded in 1988 by ex-military officer Ren Zhengfei and formed as a private company owned by its employees. Its core missions are building telecommunications networks; providing operational and consulting services and equipment to enterprises inside and outside of China; and manufacturing communications devices for the consumer market. Huawei has over 140,000 employees, around 46% of whom are engaged in research and development (R&D). It has 20 R&D institutes in countries including China, the United States, Germany, Sweden, India, Russia, and Turkey, and in 2011 invested around US$3.74 billion in R&D.

In 2010, Huawei recorded profit of 23.8 billion CNY (3.7 billion USD). Its products and services have been deployed in more than 140 countries and it currently serves 45 of the world's 50 largest telecoms operators.

Critics have pointed to the issues Huawei has with intellectual property rights, security concerns and treatment of its workforce and customers. Huawei representatives have in turn denied or disputed these allegations. Source: Wikipedia

ZTE Corporation (formerly Zhongxing Telecommunication Equipment Corporation) (SZSE: 000063; SEHK: 0763) is a Chinese multinational telecommunications equipment and systems company headquartered in Shenzhen, China. It is the world's fourth-largest mobile phone manufacturer measured by 2011 unit sales and the world's fifth-largest telecoms equipment maker measured by 2011 revenues (after Ericsson, Huawei, Alcatel-Lucent and Nokia Siemens Networks).

ZTE's core products are wireless, exchange, access, optical transmission and data telecommunications gear; mobile phones; and telecommunications software. It also offers products that provide value-added services, such as video on demand and streaming media. ZTE primarily sells products under its own name but it is also an OEM, manufacturing some products which retail under other brand names.

ZTE was founded in 1985 by a group of state-owned enterprises associated with China's Ministry of Aerospace. Source: Wikipedia

According to much concern or most concentration on security threat, we got a news related to the both Chinese companies mentioned above that found by US committee, that's Huawei and ZTE pose national security threat...

Huawei and ZTE pose national security threat, US committee finds

After a year-long investigation, a US congressional committee on Monday concluded that Chinese telecommunication equipment vendors Huawei Technologies and ZTE pose a security threat to the US, with lawmakers advising US private-sector firms to not buy networking gear from the companies....

Read more: Huawei and ZTE pose national security threat, US committee finds

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Wednesday 3 October 2012

Network Security News: Cyber Attacks from China on Crucial US Government Network

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Cyber Attacks from China on Crucial US Government Network

A cyber attack on a secure US government network has confirmed fears that Chinese hackers are trying to gain access to classified defense information.

The attack came in September in the form of what's called spear phishing - an email with an attachment or bad link leading to a malicious website. The attack was linked to computer servers in China.

Fox News reported an unnamed source saying it was sent to someone in the White House Communications Agency. The employee opened the email against protocol but reportedly the attack was contained. The Communications Agency is responsible for internal White House communication as well as broader communication controlling nuclear commands. An unnamed White House official told the AP there was no indication that any information was obtained through the attack.

During his visit to Beijing this September, US Defense Secretary Leon Panetta raised concerns over the issue of cyber warfare. He called it the "potential battlefield of the future" and cited cyber attacks originating in China. He said he opened the discussion with Chinese leaders on international rules and standards for cyber warfare, but no concrete actions had been taken.

The cyber attacks have not been directly linked to the Chinese regime. However, published writings by the People's Liberation Army show that cyber attacks are a part of China's military strategy.

For more news and videos visit ☛ http://english.ntdtv.com
Follow us on Twitter ☛ http://twitter.com/NTDTelevision
Add us on Facebook ☛ http://on.fb.me/s5KV2C

Watch the video of Cyber Attacks from China on Crucial US Government Network from NTD below:

Cyber Attacks from China on Crucial US Government Network:

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Tuesday 24 July 2012

Cisco to cut 1,300 jobs in realignment

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Cisco to cut 1,300 jobs in realignment

According to an AFP reported, Cisco Systems said Monday it was cutting 1,300 jobs, or two percent of its global workforce, in response to an uncertain economic outlook.

In its most recent quarter, Cisco posted a profit of $2.2 billion on $11.6 billion revenues, but shares tumbled at the time on a weaker-than-expected outlook.

Cisco shares were down 1.8 percent at $16.07 in the regular session on Wall Street Monday, from recent highs in April above $20.

Let me quote the reported from AFP:

NEW YORK: US computer network giant Cisco Systems said Monday it was cutting 1,300 jobs, or two percent of its global workforce, in response to an uncertain economic outlook.

The California tech firm, seen as a bellwether for the industry, said it was carrying out "a focused set of limited restructurings" that include the job cuts.

"We routinely review our business to determine where we need to align investment based on growth opportunities," the San Jose, California firm known for its Internet hardware, in a statement.

"Additionally, we continue to evaluate our organizational structure as part of our plan to drive simplicity, speed of decisions and agility across Cisco."

The statement added: "As we focus on both of these efforts, we are performing a focused set of limited restructurings that will collectively impact approximately two percent of our global employee population.

"These actions, subject to local legal requirements, including consultation where required, are part of a continuous process of simplifying the company, as well as assessing the economic environment in certain parts of the world."

In its most recent quarter, Cisco posted a profit of $2.2 billion on $11.6 billion revenues, but shares tumbled at the time on a weaker-than-expected outlook.

Cisco shares were down 1.8 percent at $16.07 in the regular session on Wall Street Monday, from recent highs in April above $20.

-AFP/ac



Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Monday 23 July 2012

The First CCIE in Cambodia

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

The proverb “like father, like son” explains the inevitable similarities between parents and their offspring. In Cambodia these similarities often extend to the professional realm, as it is quite common for children to take over the family business when the opportunity arises. Pheng Sovanvichet’s parents expected him to do the same thing, encouraging him to study medicine so he could take over their pharmacy when they retired. But he had other plans. “My parents wanted me to study medical science when I finished high school because we have our own pharmacy,” said the 25-year-old pioneer. Instead he enrolled as a scholarship student of economics and information technology at the Royal University of Law and Economics.

Today his decision has proven to be a good one, as the IT-specialist is the only person in Cambodia who can call themselves a Cisco Certified Internetwork Expert. After years studying abroad, Pheng Sovanvichet has now brought his talents back home, working with Wicam Corporation as an IP Core Network Specialist and Sunrise Informatics Center as a Cisco instructor.

While he said he has been obsessed with technology since he was 8 years-old, it was a conversation with a couple he met in Chinese-language classes that piqued his interest in Cisco.

“One day Mr Bryan (the husband) told me about his job, his duties and even his salary of US$1.6 million dollars per year, which made me so interested,” he said.

He occasionally consulted the couple for help, but spent hours alone learning about the cutting-edge technology. “Sixty percent of my time and effort was for Cisco, while the other 40 percent was for university,” he said.

In 2007, he successfully reached the first level of Cisco certification, becoming a Cisco Certified Network Associate (CCNA) with a perfect score of 1,000 out of 1,000 on the company’s test. Realising he couldn’t advance further on his own, he enrolled at Ya Wei Training Institute in China to study with Cisco experts. In 2008, he took the exam for the next level of Cisco operators and once again got a perfect score. In his spare time that year he also created a website to share his ideas and experience about new technology and Cisco with fellow IT experts in Cambodia and around the world at khmeritforum.net.

After another year of studying, he tested to become a Cisco Certified Internetwork Expert in Routing and Switching. In 2009 he passed the written exam and in 2010 he passed the lab test to become the first person in Cambodia and the 26,884th person in the world to reach Cisco’s highest level of expertise.

Even after his much-celebrated accomplishment, the tech whiz is still not content. “There are always new things being discovered,” he said. “So I have to keep updating myself. I plan to get another CCIE in security; since when Cambodia has a network infrastructure, security will be needed.”

Source: Phnompenhpost

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Friday 6 July 2012

Network Security Notes: Network Security Hot News: DNSChanger malware may cause thousands to lose internet access

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

DNSChanger malware may cause thousands to lose internet access

Source: Heraldsun Australia

TENS of thousands of computer users across the world - including 6000 Australians - may lose their internet access on Monday when a virus security fix expires.


The problem stems from malicious software, or malware, known as DNSChanger, which was created by cybercriminals to redirect internet traffic by hijacking the domain name systems of web browsers.

The ring behind the DNSChanger virus, discovered in 2007, was shut down last year by the US Federal Bureau of Investigation (FBI), Estonian police and other law enforcement agencies.

Because the virus controlled so much web traffic, authorities obtained a court order to allow the FBI to operate replacement servers which allow traffic to flow normally from infected computers.

But that order expires on Monday, when experts say infected computers will face an "internet doomsday".

The FBI, Facebook, Google, internet service providers and security firms have been scrambling to warn users about the problem and direct them to fixes.

According to a working group set up by experts, more than 300,000 computers remained infected as of June 11.

The largest number were in the United States (69,000), but more than a dozen countries - including Australia, Italy, Germany, India, Britain, Canada and France - are also believed to have infected computers.

Around 6000 Australians affected by the DNSChanger malware will have no internet from 2pm AEST on July 9 as the temporary solution switches off, the Australian Communications and Media Authority told AAP.

Australians can go to http://dns-ok.gov.au/ to check if their computer is affected.

Security experts say it's not clear how many of the affected computers are active.

"Reaching victims is a very hard problem, and something we have had issues with for years," said Johannes Ullrich, a researcher with the SANS Security Institute.

But he said he expected the impact to be "minimal" because many of these systems are no longer used or maintained.

Users who think they are infected may perform a test at the DNSChanger Working Group's website http://www.dcwg.org/ or others operated by various security firms.

The security firm internet Identity said last week that at least 58 of all Fortune 500 companies and two out of 55 major government entities had at least one computer or router that was infected with DNSChanger.

That's an improvement over January, when half of Fortune 500 companies and US federal agencies were infected.

"DNSChanger is an insidious form of malware affecting everyone from the everyday consumer to a large chunk of the Fortune 500," said IID chief executive Lars Harvey.

IID said that the malware also compromises computers by preventing antivirus software updates.

"This enables criminals to view any data, messages exchanged and more on a victim's computer, depending on what the victims' machines are infected with," the company said.

The security firm McAfee, which also offers a diagnostic tool at http://www.mcafee.com/dnscheck, said users must act before Monday to clean their computers.

"If users' computers have the wrong DNS settings for the servers, they will not be able to access websites, send email or use internet services," a McAfee statement said on Thursday.

Google said in May it was seeking to notify 500,000 users of likely infections who were using the FBI servers.

Google spokesman Jay Nancarrow said on Thursday it was not clear how many remain infected.

"We've notified many people and have seen some clean-up as a result, but we expect others with affected devices will likely encounter problems after the deadline passes," he told AFP.

For computers affected, the blackout will be total, experts say.

"Connectivity will be lost to the internet PERIOD," said a blog posting from the security firm Symantec.

"If your computer is still using DNS entries that are pointing to the FBI servers on July 9, you will lose TOTAL access to the internet. No connecting to the office from home, no updating Facebook, nothing until the DNS settings are fixed."

Six Estonians and a Russian were charged last November with infecting computers, including NASA machines, with the malware as part of an online advertising scam that reaped at least $US14 million.

The internet fraud, which took place between 2007 and October 2011, involved redirecting users searching for websites such as iTunes, Netflix and even the US tax collection agency.

At least four million computers located in over 100 countries may have been infected.

DNSChanger Malware from FBI.GOV:

DNS (Domain Name System) is an Internet service that converts user-friendly domain names into the numerical Internet protocol (IP) addresses that computers use to talk to each other. When you enter a domain name, such as www.fbi.gov, in your web browser address bar, your computer contacts DNS servers to determine the IP address for the website. Your computer then uses this IP address to locate and connect to the website. DNS servers are operated by your Internet service provider (ISP) and are included in your computer’s network configuration. DNS and DNS Servers are a critical component of your computer’s operating environment—without them, you would not be able to access websites, send e-mail, or use any other Internet services.

Criminals have learned that if they can control a user’s DNS servers, they can control what sites the user connects to on the Internet. By controlling DNS, a criminal can get an unsuspecting user to connect to a fraudulent website or to interfere with that user’s online web browsing. One way criminals do this is by infecting computers with a class of malicious software (malware) called DNSChanger. In this scenario, the criminal uses the malware to change the user’s DNS server settings to replace the ISP’s good DNS servers with bad DNS servers operated by the criminal. A bad DNS server operated by a criminal is referred to as a rogue DNS server.

The FBI has uncovered a network of rogue DNS servers and has taken steps to disable it. The FBI is also undertaking an effort to identify and notify victims who have been impacted by the DNSChanger malware. One consequence of disabling the rogue DNS network is that victims who rely on the rogue DNS network for DNS service could lose access to DNS services. To address this, the FBI has worked with private sector technical experts to develop a plan for a private-sector, non-government entity to operate and maintain clean DNS servers for the infected victims. The FBI has also provided information to ISPs that can be used to redirect their users from the rogue DNS servers to the ISPs’ own legitimate servers. The FBI will support the operation of the clean DNS servers for four months, allowing time for users, businesses, and other entities to identify and fix infected computers. At no time will the FBI have access to any data concerning the Internet activity of the victims.

It is quite possible that computers infected with this malware may also be infected with other malware. The establishment of these clean DNS servers does not guarantee that the computers are safe from other malware. The main intent is to ensure users do not lose DNS services.

What Does DNSChanger Do to My Computer?

DNSChanger malware causes a computer to use rogue DNS servers in one of two ways. First, it changes the computer’s DNS server settings to replace the ISP’s good DNS servers with rogue DNS servers operated by the criminal. Second, it attempts to access devices on the victim’s small office/home office (SOHO) network that run a dynamic host configuration protocol (DHCP) server (eg. a router or home gateway). The malware attempts to access these devices using common default usernames and passwords and, if successful, changes the DNS servers these devices use from the ISP’s good DNS servers to rogue DNS servers operated by the criminals. This is a change that may impact all computers on the SOHO network, even if those computers are not infected with the malware.

Am I Infected?

The best way to determine if your computer or SOHO router has been affected by DNSChanger is to have them evaluated by a computer professional. However, the following steps can help you gather information before consulting a computer professional.
To determine if a computer is using rogue DNS servers, it is necessary to check the DNS server settings on the computer. If the computer is connected to a wireless access point or router, the settings on those devices should be checked as well.

Checking the Computer:

If you are using a Windows computer, open a command prompt. This can be done by selecting Run from the Start Menu and entering cmd.exe or starting the command prompt application, typically located in the Accessories folder within Programs on your Start Menu...

At the command prompt, enter:
ipconfig /all
Look for the entry that reads “DNS Servers……….”

The numbers on this line and the line(s) below it are the IP addresses for your DNS servers. These numbers are in the format of nnn.nnn.nnn.nnn, where nnn is a number in the range of 0 to 255. Make note of the IP addresses for the DNS servers and compare them to the table of known rogue DNS servers listed later in this document. If the IP addresses of your DNS server appear in the table below, then the computer is using rogue DNS.

You can also look for your DNS servers without using the command prompt.
For windows XP machines, click on Start and select My Network Places. Then select Network Connections. In this example, the wireless connection is used.....

Checking the Router

Small office/home office routers connect your network of computers and devices to your Internet service provider. The SOHO router may have been purchased and installed by you or installed by your ISP. Linksys, D-Link, Netgear, and Cisco are common SOHO router brands, but there are many others.

The DNSChanger malware is capable of changing the DNS server settings within SOHO routers that have the default username and password provided by the manufacturer. If you did not change the default password at the time the SOHO router was installed, you must check the SOHO router settings.

The procedure to access your SOHO router setting varies by manufacturer, so consult your product documentation. Once you have access to the SOHO router configuration, compare the DNS servers listed to those in the rogue DNS servers table above. If your SOHO router is configured to use one or more of the rogue DNS servers, a computer on your network may be infected with DNSChanger malware.

What Should I Do?

In addition to directing your computer to utilize rogue DNS servers, the DNSChanger malware may have prevented your computer from obtaining operating system and anti-malware updates, both critical to protecting your computer from online threats. This behavior increases the likelihood of your computer being infected by additional malware. The criminals who conspired to infect computers with this malware utilized various methods to spread the infections. At this time, there is no single patch or fix that can be downloaded and installed to remove this malware. Individuals who believe their computer may be infected should consult a computer professional.
Individuals who do not have a recent back-up of their important documents, photos, music, and other files should complete a back-up before attempting to clean the malware or utilize the restore procedures that may have been packaged with your computer.

Information regarding malicious software removal can be found at the website of the United States Computer Emergency Readiness Team: https://www.us-cert.gov/reading_room/trojan-recovery.pdf.

For details news about DNSChanger Malware, please visit:

http://www.heraldsun.com.au/news/national/dnschanger-malware-may-cause-thousands-to-lose-internet-access/story-fncynkc6-1226419316723

http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer-malware.pdf

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Tuesday 3 July 2012

Network Security Notes: Great Video For Network Security: Intrusion Detection and Network Security Perspectives From A Veteran

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Intrusion Detection and Network Security Perspectives From A Veteran

This post, I would like to share a great video related to Network Security Perspectives. It's a great video with long details presentation...


Talk by Martin Roesch, Chief Technical Officer, Sourcefire, part of the Google and University of Maryland Cybersecurity Seminar Series

It's been over 12 years since the Snort® project was released. Millions of downloads and trillions of packets later many lessons have been learned. In that time it has gone from being a weekend project to the worldwide standard implementation of a fundamental component of securing networks against cyber attacks. Join Snort's original author, Martin Roesch, CTO of Sourcefire, as he discusses the past, present and future of network security architecture and technology.

Biography: Martin Roesch founded Sourcefire in 2001 and serves as its Chief Technology Officer (CTO). A respected authority on intrusion prevention and detection technology and forensics, he is responsible for the technical direction and product development efforts for Sourcefire's commercial and open source product offerings. With nearly 20 years of industry experience in network security and embedded systems engineering, Roesch has dedicated himself to developing intelligent network security tools and technologies to address evolving threats. Roesch has been interviewed as an industry expert in multiple technology publications, as well as print and online news services, such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. Roesch founded Sourcefire® in 2001 and is the author and lead developer of the Snort® Intrusion Prevention and Detection System that forms the foundation for the Sourcefire IPSTM. Roesch has received a host of awards of his technology innovation and vision. Most recently, he was recognized as a 2010 Security Superstar by Everything Channel's CRN magazine for the value his innovations provide partners and customers, and was selected as one of eWeek's Top 100 Most Influential People in IT. Roesch holds a B.S. in Electrical and Computer Engineering from Clarkson University.

Intrusion Detection and Network Security Perspectives From A Veteran:

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Thursday 14 June 2012

Network Security Notes: Internet Security: The Father of the Internet Explains the Tracking the Internet into the 21st Century

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Internet Security: The Father of the Internet Explains the Tracking the Internet into the 21st Century

Billion people using Internet today, regarding the Internet security reasons, this post I would like to share with you a video lecture presentation by a Google person, Mr.Vint Cerf, the Chief Internet Evangelist at Google. He talks to an audience about the past and future of the internet and its continuing development. His talk includes information about current needs for internet research including internet security, improved networks and IPv6 addresses at Stanford University, January 9, 2008.

This is very great video to watch since you want to learn more about Internet security...

Tracking the Internet into the 21st Century:



Wikipedia: Vinton Gray "Vint" Cerf, born June 23, 1943 is an American computer scientist, who is recognized as one of "the fathers of the Internet", sharing this title with American computer scientist Bob Kahn. His contributions have been acknowledged and lauded, repeatedly, with honorary degrees and awards that include the National Medal of Technology, the Turing Award, the Presidential Medal of Freedom, and membership in the National Academy of Engineering.

In the early days, Cerf was a program manager for the United States Department of Defense Advanced Research Projects Agency (DARPA) funding various groups to develop TCP/IP technology. When the Internet began to transition to a commercial opportunity during the late 1980s,[citation needed] Cerf moved to MCI where he was instrumental in the development of the first commercial email system (MCI Mail) connected to the Internet.

Vinton Cerf was instrumental in the funding and formation of ICANN from the start. Cerf waited in the wings for a year before he stepped forward to join the ICANN Board. Eventually he became the Chairman of ICANN. Cerf was elected as the president of the Association for Computing Machinery in May 2012.

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Saturday 21 April 2012

Network Security Notes: Assessing Network Security

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Assessing Network Security
This post, I would like to share with you a great video of assessing network security.... In this video, you will learn about... Basic WAN Design... Modular WAN Interconnection WAN Planning and Design Comparing WAN Types Considerations for WAN Implementation Let watch out the video below for more details about the assessing networking security...
Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Sunday 25 March 2012

Network Security Notes: Seven Steps To Securing Your Industrial Network

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Seven Steps To Securing Your Industrial Network

This post I would like to share you about securing your industrial network that introduced by Tofino...

Eric Byres, CTO of Byres Security, presents the seven steps to industrial-strength security with Tofino™.


0:03 - Tofino - The Industrial Security Solution - Eric Byres gives a brief overview of some of the issues with today's firewalls, and introduces the Tofino Industrial Security Solution.

1:14 - Step 1: Plug and Play Installation - No plant downtime, No special training required for installation.

1:46 - Step 2: Discover Tofino - Have your Tofino report in with only a couple mouse clicks.

1:55 - Step 3: Customize Tofino - Deploy multiple security functions with one appliance.

2:11 - Step 4: Examine Your Network and Diagram it - Using Tofino allows you to map your network and build a diagram.

2:20 - Step 5: Command Your Tofino - Having specialized IT knowledge or command line programming is not required, and most human errors are avoided.

2:44 - Step 6: Test Mode - With test mode, there are no process upsets and traffic is allowed through, but Tofino notes which traffic would have been blocked based on the rules that were set.

3:05 - Step 7: Protect Your Plant - Protect your plant with no interruptions to the network and no downtime.

3:34 - Tofino Industrial Security Solution Key Components - Eric Byres explains the three key components - Security Appliances, Loadable Security Modules, and Central Management Platform.



Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Friday 2 March 2012

Network Security Notes: Secure Your Network Routing with Suppressing Route Advertisements

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Secure Your Network Routing with Suppressing Route Advertisements

In network configuration, especially with router configuration, I'm sure that you are familiar with the word route advertisements. To make other network node can learn from your network, you have to advertise your network route by using any suitable network routing protocol. Otherwise,for security reason, you should be aware of which interface of your router should be configured with allowing route update being sent.

To prevent other routers on a network from learning about routes dynamically, you can prevent routing update messages from being sent out a router interface. To accomplish this, use the passive−interface <interface> routing process configuration command. This command can be used on all IP−based routing protocols except for the Exterior Gateway Protocol (EGP) and Border Gateway Protocol (BGP). When an interface is configured to be in a passive state, the router disables the passing of routing protocol advertisements out of the interface; however, the interface still listens and accepts any route advertisement that is received into the interface. Configuring this on a router essentially makes the router a silent host over the interfaces that were specified. To configure an interface as passive, use the passive−interface <interface> command under routing protocol configuration mode; this command is all that is needed to make an interface no longer advertise networks.

Here is an example of configuring an interface as passive:

interface FastEthernet0/1
ip address 10.10.10.1 255.255.255.0
!
interface Serial0/1
ip address 192.168.100.2 255.255.255.252
!
router eigrp 100
passive−interface FastEthernet0/1
passive−interface Serial0/1
!

How Does the Passive Interface Feature Work in EIGRP?

With the passive-interface command, you can use it to control the advertisement of routing information. The command enables the suppression of routing updates over some interfaces while it allows updates to be exchanged normally over other interfaces.

With most routing protocols, the passive-interface command restricts outgoing advertisements only. But, when used with Enhanced Interior Gateway Routing Protocol (EIGRP), the effect is slightly different. The use of the passive-interface command in EIGRP suppresses the exchange of hello packets between two routers, which results in the loss of their neighbor relationship. This stops not only routing updates from being advertised, but it also suppresses incoming routing updates in your network.

Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Sunday 26 February 2012

Network Security Notes: Top 10 IT Certifications for Security Cleared Professionals

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Top 10 IT Certifications for Security Cleared Professionals

My previous post about Top 5 Network Security Threats for 2011, here this post, I would like to introduce to you the top 10 IT Certifications for security cleared professional presented by ClearanceJobs TV...

The top certificates as I remember include:

Comp TIA's Security+ Certification
A+
Network +
Information Technology Infrastructure Library
Certified Information Systems Security Professional(CISSP)
Project Management Professional
Microsoft Certifications
Cisco Certified Network Associates
...

For more details about the security certifications, please watch the video below...
Top 10 IT Certifications for Security Cleared Professionals
Certifications can take your job, and your salary, to another level. Find out which certifications are most widely held among security cleared professionals. With the demand for cybersecurity professionals continually on the rise, these top 10 certifications are being used by many to bridge the experience gap and help them land their dream job.


Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Thursday 9 February 2012

Network Security Notes: Top 5 Network Security Threats for 2011

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Top 5 Network Security Threats for 2011

First of all, do you know Threats?

In general, A threat is an act of coercion wherein an act is proposed to elicit a negative response. It is a communicated intent to inflict harm or loss on another person. It can be a crime in many jurisdictions. Threat (intimidation) is widely used in animal kingdom, particularly in a ritualized form, chiefly in order to avoid the unnecessary physical violence that can lead to physical damage or death of both conflicting parties.

How about network threat?

A network threat can be network tool, or network application or any software application that can cause a network in a harmful way or under the attack...

A my post in the past, you may also read about the type of threats in network, please review back here>>>

Top 5 Network Security Threats for 2011
Frank Andrus, CTO of Bradford Networks, will describe the Top 5 Network Security Threats for 2011, and provide advice for securing your network against them.

Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Tuesday 31 January 2012

Network Security Notes: Security Certified Network Professional (SCNP)

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Security Certified Network Professional (SCNP)

In this post related to Network Security, I would like to share you a video of SCNP. I really like and pay too much attention on the course of security. I want the SCNP certificate too much..What can I do??? Yeah..Just try hard more on network security by learning on network security relating book, learn from Youtube videos, follow network security expert guy or network security professor...

Like video below, a network security professor explaining about the Security Certified Network Professional...Very very relevant to the network security...

The Strategic Infrastructure Security course picks up right where Tactical Perimeter Defense leaves off. The second course in the SCP line-up leads to a certification of Security Certified Network Professional (SCNP). It will give a network administrator the additional hands on skills needed to protect their network from the inside out. This course teaches you about prevention techniques as well as giving the candidate an understanding of risk analysis and security policy creation in a blended technology environment. The up-to-date security lessons and intense, hands-on labs bring a real world network security to training candidates.

Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Wednesday 25 January 2012

Network Security Notes: Network Security News: President Obama on Cisco Networking Academy

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Network Security News: President Obama on Cisco Networking Academy

Cisco is an American multinational corporation headquartered in San Jose, California, United States, that designs and sells consumer electronics, networking, voice, and communications technology and services. Cisco has more than 60,000 employees and annual revenue of US$ 40.0 billion as of 2010. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ 100 Index and the Russell 1000 Growth Stock Index.

On July 14th, 2009, Cisco launched a new jobs training program in Michigan that was cited by President Barack Obama. The program is designed to upgrade skills and create new job opportunities and will focus on broadband, network security and healthcare IT training. More info here: http://blogs.cisco.com/news/comments/how_can_technology_help_upgrade_skills/

Watch out video below to see the US President Obama...

Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Tuesday 24 January 2012

Network Security Notes: Network Security Training: Network Security Module

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Network Security Training: Network Security Module

This podcast will allow students to learn basic network vulnerabilities, weaknesses attacks and threats caused by malicious codes or software such as Virus, Worm, Trojans and backdoors. The modules in the podcast also explain the methods to protect the network against these types of attacks by implementing various types of security.



Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Tuesday 10 January 2012

Network Security Notes: OpenDNS for Network Security

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: OpenDNS for Network Security

Well, here this post is related to network security or any security reasons...If you are using OpenDNS, this post would be very useful or important to you...

Yeah, At first you should know what is the DNS???

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.

An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses 192.0.32.10 (IPv4) and 2620:0:2d0:200::10 (IPv6).

The Domain Name System makes it possible to assign domain names to groups of Internet resources and users in a meaningful way, independent of each entity's physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 208.77.188.166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8 (IPv6). Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates them.

The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated.

In general, the Domain Name System also stores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.

Other identifiers such as RFID tags, UPCs, international characters in email addresses and host names, and a variety of other identifiers could all potentially use DNS.

The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed specification of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.

How about the OpenDNS???

OpenDNS is a DNS (Domain Name System) resolution service. OpenDNS extends DNS adding features such as misspelling correction, phishing protection, and optional content filtering. It provides an ad-supported service "showing relevant ads when we [show] search results" and a paid advertisement-free service.

OpenDNS provides the following recursive nameserver addresses for public use, mapped to the nearest operational server location by anycast routing:

208.67.222.222 (resolver1.opendns.com)
208.67.220.220 (resolver2.opendns.com)
208.67.222.220
208.67.220.222

OpenDNS also provides the following recursive nameserver addresses as part of their FamilyShield parental controls which block pornography, proxy servers, phishing sites and some malware:

208.67.222.123
208.67.220.123

IPv6 addresses (experimental)

2620:0:ccc::2
2620:0:ccd::2

OpenDNS for Network Security: Watch video below to know details for the network security with OpenDNS...

Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!

Network Security Notes: Cisco - Security Training Video

This blog is created for network security review, study and understanding about network related issues only! The blog is mainly focus on Network Security Notes about Network, Network Security, Network Technology, Network Labs review related Cisco and Microsoft technology ,Network Threats, Types of Network Threats, Network Alerts, Enterprise Security Policy and Audits, Security Policy and Audits,Logical Security, Physical and Logical Security, Physical Security,Cisco Products Review, Microsoft Products review, Cisco Routers, Routers Security, Console Access, Telnet Access, Network Attack, Network Attack report, Network management, Anti-virus, Network Security with Anti-virus, and All About Network Security... Thanks for your visit!

Network Security Notes: Cisco - Security Training Video

Video used for internal training at Cisco. The basics of Security. Shot a few years ago but still pretty relevant.

++++++++++I LOVE CISCO++++++++++


Other sites you may want to see:

WWE: http://visa-wwe.blogspot.com/
The Kingdom of Wonder: http://welcome2cambodia.blogspot.com/
Daily Blogging: http://visablogging.blogspot.com/
Love Sharing: http://visa-love.blogspot.com/
NetworkSecurity: http://networksecuritynotes.blogspot.com/
About Insurance:http://visa-insurance.blogspot.com
All about Love: http://visa-love.blogspot.com/
Learning English Online: http://visa-elb.blogspot.com/
Discovery Internet: http://visa-isp.blogspot.com/

Read more...

If you like this post, please subscribe below,thanks!

Enter your email address:

Delivered by FeedBurner

To Stay Up to date with Network Security, Please Subscribe!