Skip to content

Meta

  • Register
  • Log in
ItsyourIP.com

Your gateway to Internet

Primary Navigation Menu
Menu
  • About
  • Contact Me
  • Free Antivirus
  • Free Firewall
  • Sitemap

Security

Configure MD5 encrypted passwords for users on Cisco IOS

2008-05-20
By: admin
In: Cisco
Tagged: Cisco, encryption, ios, MD5, password, Security

The enhanced password security in Cisco IOS introduced in 12.0(18)S allows an admin to configure MD5 encryption for passwords. Prior to this feature the encryption level on Type 7 passwords used a week encryption and can be cracked easily and the clear text password (type 0) as anyone would know is completely insecure. Anyone who can gain access to the privilege mode can view/decrypt these passwords. If you’re new here, you may want to subscribe to my RSS feed. Thanks for visiting!Read More →

Enable/Configure DHCP Snooping in Cisco Catalyst Switches (IOS)

2008-05-15
By: admin
In: Cisco
Tagged: Cisco, denial-of-service, DHCP, DHCP-Snooping, ios, Option82, Security

DHCP snooping is a DHCP security feature that provides security by filtering untrusted DHCP messages and by building and maintaining a DHCP snooping binding table. An untrusted DHCP message is a message that is received from outside the network or firewall causing denial of service attacks. The DHCP snooping binding table contains the MAC address, IP address, lease time, binding type, VLAN number, and interface information that corresponds to the local untrusted interfaces of a switch. An untrusted interface is an interface that is configured to receive messages from outside the network or firewall. A trusted interface is an interface that is configured to receiveRead More →

VLAN Hopping – Layer 2 Security exploit bypass Layer 3 security

2008-04-17
By: admin
In: Security
Tagged: 802.1Q, DTP, Layer2, Layer3, Security, switch-spoofing, vlan, VLAN-Hopping

VLAN Hopping is a Layer 2 security exploit by which a malicous user connected to a switchport on a Switch assigned to a VLAN can hop on and gain access to another VLAN which otherwise is not accessible. This security exploit allows the malicous hacker to bypass the IP Securities implemented at Layer 3.Read More →

Set Login Restrictions to protect Cisco IOS Routers & Switches

2008-03-20
By: admin
In: Cisco, Security
Tagged: audit-logs, Cisco, Enhancements, failed-logins, ios, Login, router, Security, switch

While no security is fool proof, it is important that we do as much as we can to ensure maximum protection on our netowrk devices like Routers and Switches. Cisco IOS has enhanced Login restriction features which can control login attempts to it. This includes time delay between failed login attempts, block period after a set of failed login attempts and audit logs of successful and failed login attempts. These login restrictions provides more control and make it that more harder for unauthorised accesses and prevent against Dictionary based DoS attacks.Read More →

How to Add a Banner in Cisco IOS Routers and Switches

2008-02-05
By: admin
In: Cisco
Tagged: banner, Cisco, ios, motd, router, Security, services, switch

Banners are one of the important things for any device that allows remote access either for administration or for user access. They serve their purpose of warning any unauthorised users and make them aware that the device or the server is protected and being monitored and also provide a quick snapshot of what the system is and what is it used for. For example, we use banners for security warning and the device details and the service/application related to it. Adding a Banner to Cisco Router or a Catalyst switch running Cisco IOS is all a matter of one simple command.Read More →

Secure yourself from Phishing attacks with NetCraft Toolbar

2008-01-28
By: admin
In: Firefox, internet-explorer, Security, Windows
Tagged: anti-phishing, Firefox, internet-explorer, netcraft-toolbar, phishing, Security

Phishers send well crafted emails as if coming from a valid source like your bank tricking you to enter your bank account or any portal (like eBay or Paypal) details including login and password or PIN numbers . Once, you enter the details, they are sent to remote servers. Now, that’s more than anything for the hackers to loot money out of your account. Taking security seriously, we will discuss the community aided Netcraft tool bar for Internet Explorer & Firefox. First of all, I have to applaud NetCraft toolbar as by far the best toolbar that you can get for free. When I testedRead More →

Secure Internet Explorer browsing with Haute Secure plugin

2008-01-18
By: admin
In: internet-explorer, Windows
Tagged: haute-secure, id-theft, internet-explorer, malware, phishing, Security, spyware

Haute Secure is a free Internet Explorer plugin that secures you from loading bad content or malicious content or download and install malware onto your PC. When the Haute Secure add-on on your internet explorer comes across bad content it will block access to the website and prompt you for further option. It will also warn of malicious content try to load from known website. With Phishing scams, malicious malware spreading minute and the identity theft scams, it is important that we secure the browsers thereby no malicious content is downloaded onto the PC. Haute Secure supports only Internet Explorer at the moment but FirefoxRead More →

Posts navigation

1 2 … 6 Next



Categories

  • ARP
  • Browser
  • Cisco
  • Database
  • Debian
  • DHCP
  • DNS
  • DNS Records
  • Firefox
  • internet-explorer
  • IP Tools
  • juniper
  • Linux
  • MySQL
  • Network Inventory
  • Networking
  • OpenSource
  • OpenSource Clustering
  • Opensource Firewall
  • OpenSource LoadBalancer
  • Opensource NAC
  • OpenSource Router
  • Opensource VPN
  • proxy
  • Python
  • Redhat
  • Secure Shell(SSH)
  • Security
  • Security Audit
  • Security/Penetration Testing
  • Sniffing/PacketCapture
  • Solaris
  • Tools
  • Ubuntu
  • Unix
  • VirtualBox
  • voip
  • vpn
  • Windows
  • Wireless

Tags

acl Browser Cisco DHCP DNS DNS Records encryption Firefox firewall gateway High-Availability icmp internet ios ip ip-address ipsec IP Tools juniper Linux mtu network OpenSource Opensource Firewall OpenSource LoadBalancer proxy Redhat registry rhel route router routers Security snmp Solaris switch tcp tcpip udp Unix virtual-server vlan vpn Windows Wireless

Recent Posts

  • MySQL: how to delete all records from a table
  • Python: Remove last ‘n’ characters of a string
  • How to block select in PuTTY
  • How to enable/disable Right-click paste in PuTTY
  • How to change the HOST key in Oracle Virtualbox Manager
  • FileZilla FTP Client configuration through BlueCoat proxy
  • Unable to delete Stale/Obsolete statc routes in Cisco IOS
  • How to create VLAN Interfaces for InterVLAN Routing in Cisco IOS
  • High CPU usage when SNMP is enabled in Cisco Routers
  • Import WyseTerm Host List from one user to another in Windows

RSS Secunia Advisories

RSS MS Security Bulletin

RSS US-CERT Vulnerability

RSS SANS

Recent Comments

  • Forwarding ICMP over a server without redirects on How to Disable ICMP Redirects in Linux for security (Redhat,Debian,Ubuntu,SuSe tested)
  • M.Pasha on How to Disable ICMP Redirects in Linux for security (Redhat,Debian,Ubuntu,SuSe tested)
  • Steve Pollard on How to prevent VLAN Hopping in Cisco Switches
  • Routing issue Sophos UTM Home <-> Cisco ASA 5510 for only linux hosts? - Sophos User Bulletin Board on How to Disable ICMP Redirects in Linux for security (Redhat,Debian,Ubuntu,SuSe tested)
  • BranchCache – Hosted Cache Mode File Server Tutorial | theezitguy on HowTo: Add persistent Static Routes in Windows

Designed using Responsive Brix Premium. Powered by WordPress.