Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi,

I really need a help and guidance on how to go about setting up a wifi hotspot at our Cafe. We have regular customers which comes every morning to have cup of coffee and little snack. Normally, customers comes while they have their coffee for about 10 to 20 minutes and then go.

I would like to offer a Free Wifi to all my customers who comes to my cafe for coffee for 10 or 20 minutes.

I should be able to print out a wifi voucher which they can use to access the internet on their mobile phones or laptop. But usually it'll be just a mobile phone. The internet will be stricted ONLY to checking emails online and or Facebook - nothing else. It should not allow them to download softwares, torrents, since we dont have unlimited data to our ISP.

Remember, that after 20 minutes, the voucher should die out. And it can only works to one mobile phone.

Anyway's that is the plan and i hope i can get answers on how to proceed and going forward.

Thank you and i look forward to comments.

Kindest,
Bakaka
0
Enroll in August's Course of the Month
LVL 9
Enroll in August's Course of the Month

August's CompTIA IT Fundamentals course includes 19 hours of basic computer principle modules and prepares you for the certification exam. It's free for Premium Members, Team Accounts, and Qualified Experts!

hi guys

Our consultant teams have run a report for security and a good 10 people's email addresses are available on the dark web. What is the best practice from here for better securing ourselves? Change of password? 2 Factor Authentication for OWA?

Thanks for helping
Yashy
0
I'm running 64 bit Snort 2.9.9 on a  Win 10 machine.  I call to test snort as the administrator with the following command line:

c:\snort\bin  snort -c c:\snort\etc\snort.conf c:\snort\log -T  which seems to run correctly until it looks for the interface.

I tried C:snort\bin snort -W to return the interfaces but it doesn't show any.  Seems to be a 32 bit only switch.

It asks for an interface using the -i switch but I don't know which one it is.  I only have the one and I have a good IP when I check IPCONFIG.
0
Is there a way I can add a linux box to my domain network for monitoring purposes?  I'm a complete novice on this particular topic and don't know if my question even makes sense, but I have lots of spare machines I could use and dozens of Linux software disks that have come with my subscriptions to LinuxUser  and to Admin.

Is there a trade pub that would cover this, or a white paper?
0
What technology do you think is a fad that won’t last?

Not sure it really qualifies as a "fad" because it's been around so long, but I'd say that a lot of existing password guidelines (special characters, changing them every 90 days, capitalization rules, etc.) are on their way out. Don't believe me? Even the creator of those rules now regrets them.

Although, I'm really looking forward to the day when passwords can just go away almost completely...
2
 
LVL 17

Expert Comment

by:Kyle Santos
Meanwhile, I just got this.  xD

Screenshot_2.png
Arrrggghhhhhh!
1
 
LVL 17

Expert Comment

by:Kyle Santos
Come to think of it.  After I graduated high school and started using computers more often I realized how difficult it was to remember passwords that had all those wacky requirements, so I started choosing last names of random people which is kind of similar to what xkcd had mentioned about four random words.  Admittedly, I was doing my best to try and work around difficult password requirements by making it easier for me to remember!  Take that, Bill Burr!
1
I have a MS Access application running on a RDP server (2012 R2).  One of the things, I want to be able to do is to allow the users to click on the website link (in a record) and go to the contacts website, or see the address via the postcode.  However, I don't want them to be able to download anything or have too much access to other sites (so it should hide the address bar).

There is an ActiveX function in Access, but this is very limited.  Ideally, I'd like to use something like Chrome in Kiosk mode, but before I start investing time in that area, I could really do with some guidance from you guys.
0
What is your favorite password manager?  I use the hell out of LastPass.  Love it's versatility and reliability, especially across multiple platforms.  It's ease of use and short learning curve has made it a valuable part of helping my clientele manage access to specific resources with fantastic results.  What are your go to's?
4
 
LVL 49

Expert Comment

by:dbrunton
KeePass  http://keepass.info/

Variations for lots of OSes  http://keepass.info/download.html
1
 
LVL 9

Expert Comment

by:Brandon Lyon
LastPass is the one I prefer. It's easy to use on most browsers & major platforms.
1
2
I would like to get opinions on the best antivirus for a small (less than 6 Windows devices) LAN. Thanks for your help.
0
Hello there,

I"m reviewing the 802.1x's microsoft implementation to get handle on it  and consider its possible implementation in our environment. At this moment we don't have a domain, as a matter of fact we're mostly macs with no network os. I've been reading Microsoft documents and it seems to me 802.1x can be implemented without joining the computers to domain.  I've found quite a few hurdles as i keep reading and testing this so i figure it'd be a great idea to pick someone else's brain...
First, can i implement NPS in a non domain mac environment  environment? Should i consider open source for radius instead?
If any of you have implemented it, is there any lessons you would like to share with me as keep testing.

thanks for your help..
0
What is SQL Server and how does it work?
LVL 1
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

I am trying to open a port on the domain for all computers in the domain via group policy, I did the following;
Computer configurations/Windows settings/Security settings/Windows firewall with advanced security/inbound rules.
New rule
Port
TCP 155
Allow connection if secure
Entered the authorized computer that will be accessing via this port
Domain
Name - finish
Assigned the rule to the domain
Did a update cmd
But the port is not open
Working with a server 2012 and window 10
Open-155.JPGPort-155.JPG
0
Dear Team,

There is port already open between  Source -target servers.
i have tested the same using telnet command.

However while I am creating some Datasource in Application server, i am getting  the above error message.

Kindly let me know if there anything required  at OS/App servet/network side .

Kindly advice
=== ERR MESSAGE IS =========
>
<Aug 7, 2017 4:52:24 PM AST> <Warning> <Deployer> <BEA-149004> <Failures were detected while initiating activate task for application 'test'.>
<Aug 7, 2017 4:52:24 PM AST> <Warning> <Deployer> <BEA-149078> <Stack trace for message 149004
java.rmi.RemoteException: [Deployer:149150]An IOException occurred while reading input.; nested exception is:
        java.net.NoRouteToHostException: No route to host
        at weblogic.deploy.service.internal.transport.http.HTTPMessageSender.sendMessageToServerURL(HTTPMessageSender.java:343)
0
Introduction Ensuring the confidentiality and integrity of data in modern technology environment is a tasking job which requires several mechanisms to accomplish. The security of any network system depends on the physical infrastructure, security resources and nature of data being protected.
0
I've been tasked with setting up a bunch of raspberry pi 3 as honeypots around a huge network.  I would like to have these all report into one server.  I saw the Modern Honeypot Network project but it's out of date.
I'd like some suggestions here.  Thanks!
0
www.virustotal.com
A cybersecurity trainer told his class of students (some are my colleagues)
that it's not a good idea to upload suspicious attachments (usually obtained
from suspicious/spam emails we received) as hackers would know that these
emails have successfully reached some valid email recipients or his attack
targets.  The trainer suggests that we get the hash value of the attachments
& scan those instead.

Pls assess if the above is valid as I disagree with his views

1. I've used virustotal but it only say how many scans have been done so it
  could have been scanned by many parties.  Suppose the hackers only send
  to a few targets & truly could know which targets have received the malicious
  attachments, wouldn't the hackers also know if we scan using the hashes of
  the attachments (as a hash is unique to each file) ?  

2. Secondly if virustotal truly could identify who has received the attachments
   & is scanning it at virustotal, I reckon hackers don't need to resort to this:
   various tools like mxtools.com & even if someone downloads the images
   of spam emails, these are easier ways to track right?

3. Lastly, is virustotal so vulnerable?  (by the number of previous scans that
    it reported, it will give hackers a good clue?)
0
Hello,

Trying to create a Site to Site between our TZ215 and Azure:
VNET1 - Address Space     = 10.1.0.0/16
               Subnet  range      = 10.1.0.0/24

GatewaySubnet                  = 10.1.1.0/24

Virtual Net Gateway           = VPN
                                               = Policy-based
                                               = VNET1
                                               = VNET1GWIP  (created Public IP)

Local Net Gateway             = RP_OFFICE
                                              = Public IP address of SonicWALL
                                              = 192.168.250.0/24 (LAN network on SonicWALL)

Connection                          = Site-to-Site (IPsec)
                                               = Virtual Net Gateway
                                               = RP_OFFICE
                                               = Shared key that matches what's configured in the SonicWALL

SonicWALL:
 General Tab                         = Site to Site, IKE using Preshared , IPsec Primary = Public IP of Azure, IPsec Secondary = 0.0.0.0, Local & 
                                                   Peer IKE ID = IPv4 address
Network Tab                         = LAN Subnets, Azure LAN network
Proposals Tab                       = Main Mode, Group 2, AES-256, SHA1, 28800, ESP, AES-256, SHA1, 3600
             
Seeing the following in the SonicWALL log:
  SENDING>>>> ISAKMP OAK INFO …
0
In the search tool - you can select source or destination address that EQUALS, NOT EQUALS, IS EITHER, IS NEITHER. But what I haven't figured out is how to search by subnet. e.g. show me all the traffic with Destination in the 10.12.67.0/24 subnet. Is that possible?
0
I have custom the CFS URL filtering on my new Sonicwall TZ300. It works fine from LAN to WAN.

Try to customize the same setting from my WLAN to WAN but it doesn't block those prohibted URLs as expected. Any idea ? Is there a place in Sonicwall to check where it is passed or blocked ?

Thx

CFS
0
What is the process to logon to or reset the logon username and password for a SonicWALL TZ600 router when the logon information isn't known?

We don't want to reset any information on the router we simply want to logon to it or reset the username and password.

We have physical access to this router.

How can this be done?
0
Free Tool: ZipGrep
LVL 9
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Hi. Anyone have any experience with EPP (we're looking at a Cylance Protect and Bitdefender) and SIEM (Event Tracker)? Anyone using both or either and can offer thoughts or suggestions? Looking for best protections against the ransomware plague and other infections.
We're a MS shop (Windows, Office SQL etc.) and I know MS has ATA but not sure if it's comparable to the above products.
0
In this article, we’ll look at how to deploy ProxySQL.
0
I am using Securely as my web-filter I need one SSID to be completely unfiltered I have setup all I need to to do this including ACL's and on some devices it works and on others I get google.com saying " Your connection is not private" and I can't get to google.com but I can get to all other sites unfiltered. I have never encountered this and I would just like some kind of input if you have experienced this before thank you for all of your help in advance.
0
TMG 2010 is blocking some websites, when I try to create a rule to bypass the proxy setting of the TMG again I am not able to access the sites, should we say that the status of the TMG now does not accept creating rules or why is it like that? Help me team.
0
All of a sudden a user is getting an error when trying to connect to workstation through a site to site vpn that says "An error has occurred", If the VPN is diconnected and the WAN IP Address with the Port is used then the RDP works just fine. VPN is configured on  Sonicwall TZ215 and TZ100. We can also RDP on the same LAN as the system without issue.
0
Our apps team somehow has a way of detecting that 61.239.162.190 is an
IP of a credit card fraud : I'm not quite close to the team so anyone know
if there are IP list out there that blacklist it?

I've checked www.ipvoid.com & threatstop.com but this IP is not in their
extensive blacklists.

How can I find out the mode of fraud of this IP?  Does this source IP send
emails or via sort of application (credit card processing)?

I've heard of several Online Fraud Tools (by IBM & F5) but haven't managed
to play with them yet
0

Network Security

Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, and covers a variety of computer networks; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.