IDS

Home/Tag: IDS

What is Footprinting? What is Reconnaissance?

2020-12-11T13:56:30+00:00Categories: Certified Ethical Hacker, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Footprinting (also known as reconnaissance) commonly refers to one of the pre-attack phases; tasks performed before doing the actual attack. In other words, footprinting is the first step in the evaluation of the security posture of the target organization's IT infrastructure. During this phase, a hacker can collect the following information − Domain name IP [...]

Watchguard Firewall

2020-09-11T12:44:34+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , |

We have introduced several hardware firewalls on this website so far. In this post also, we intend to do the same. Watchguard is one of the well-known manufacturers of network security products. We have examined several well-known firewalls in the network world. Now it is time to check the firewalls of this manufacturer. Watchguard generally [...]

Software Firewalls

2020-09-10T13:35:37+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , |

You know that firewalls exist in both as software and as hardware devices. Each has its advantages and disadvantages. In general, the use of software firewalls for home use, personal use and small businesses is recommended, as well as the use of hardware firewalls for medium and large businesses. To read: All things about firewall [...]

Cisco ASA Firewalls

2020-09-11T12:51:18+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

This post is about Cisco Firewalls. It aggregates available information from datasheets published by Cisco. The ASA in Cisco ASA stands for Adaptive Security Appliance. We suggest that you read the following two posts before continuing to read this post: All Things about Firewall Hardware Firewalls In fact, Cisco ASA is a security device that combines [...]

Basics of Network Security

2020-08-14T07:15:24+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , |

It is essential for all organizations to protect their networks. With hackers increasing and becoming smarter day by day, the need to utilize network security tool becomes more and more impotent. Network security is any activity designed to protect the usability and integrity of network and data. In fact, network security is a term used [...]

OS Fingerprinting

2020-07-25T12:57:16+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

If a hacker can determine what type of operating system a targeted computer is running, he or she can work to exploit the vulnerabilities present in that operating system. OS Fingerprinting is used by security professionals and hackers for mapping remote networks and determining which vulnerabilities might be present to exploit. In fact, it is [...]

What’s DLP?

2020-08-24T08:51:40+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , |

Data loss refers to an event in which important data is lost to the enterprise, such as in a ransomware attack. Data loss prevention (DLP) focuses on preventing illicit transfer of data outside organizational boundaries. Data loss prevention is a set of tools and processes used to ensure that sensitive data is not lost, misused, [...]

Wireshark

2020-09-24T11:37:32+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Wireshark is a network packet analyzer. This software one of the best packet analyzers available today and is available for free, and it is open source. This software, formerly known as Ethereal but the project was renamed Wireshark in May 2006 due to trademark issues. Sources: wireshark.org   and  en.wikipedia.org Wireshark is cross-platform and it runs [...]

Free Port Scanner Tools

2020-09-02T05:43:26+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , , , , , |

First of all, we recommend that you read our other post entitled "TCP/UDP Ports". But, what are free port scanner tools? A port scan learns which ports on a router or firewall are open, and can use this information to find a computer system’s potential weaknesses. A port-scanner tool asks about each port, one at [...]

Go to Top