security

Hikvision nastavení s Gmailem

If you’d like to get email alerts, we recommend using a Gmail account since it’s free, secure, widespread, and easy to configure. You can use other email providers as well (such as Outlook, Yahoo, etc.), the steps are similar. NOTE: As…

SYN Flood attacks

Recent work by Andre Oppermann uses the TCP Timestamp option in conjunction with the Sequence Number field to encode more state information and preserve the use of high-performance options such as TCP Window Scaling, and TCP Selective Acknowledgment Options (SACK), and…

IDS Tipping Point

Proactive Network SecurityIntrusion Detection Systems, by definition, only detect and do not block unwanted traffic. The TippingPoint IPS operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. In fact, TippingPoint optimizes…

Setting the secure flag in the cookies

Security team identified following flaw – Session Cookie without Secure flag set Original article on TechRepublic TechRepublic had an interesting article about the Surf Jack attack. Many people commented, some giving their own solution to the problem. However many of…

Track / Trace method on web server

Symptomps: serverxyz:~ # telnet 127.15.10.36 80 Trying 127.15.10.36… Connected to 10.17.105.34. Escape character is ‚^]‘. TRACE / HTTP HTTP 200 OK Date: Wed, 22 Aug 2012 12:17:05 GMT Server: Apache (Unix) mod_ssl OpenSSL Connection: close Content-Type: message/http TRACE / HTTP…

Nessus/Acunetix security scan

Recomended security scan tool that reports open ports, incomplete configuration and other security related issues in your network. For security practitioners who assess complex enterprise networks for security flaws and compliance issues, Nessus is the world’s most widely-deployed vulnerability and…