81. | - Protecting Your Network from the Wi-Fi Protected Setup Security Hole
- Mar 12, 2012
- Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
|
82. | - Q&A with the Authors of "AAA Identity Management Security"
- Feb 7, 2011
- The authors of AAA Identity Management Security discuss the book and its features.
|
83. | - Recovering and Securing Your Wi-Fi Encryption Keys
- Jun 4, 2010
- Have you forgotten the WEP or WPA key or passphrase for your Wi-Fi? Eric Geier helps you discover how to recover or reset and secure your network password.
|
84. | - Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
- Apr 25, 2013
- Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
|
85. | - Securing the Cisco Security Monitoring, Analysis, and Response System
- Jul 3, 2008
- This chapter describes recommendations for securing MARS appliances, both physically and electronically.
|
86. | - Securing the Corporate Network
- Dec 21, 2001
- Authenticate your dial-in users using your local database, and make sure your AAA is in place-- that's authentication, authorization, and accounting.
|
87. | - Securing Wireless Networks
- Jul 2, 2008
- This chapter discusses wireless security, including a checklist for securing Wi-Fi.
|
88. | - Securing Your Wi-Fi Hotspot Sessions
- Mar 30, 2010
- Eric Geier shares tips to keep your email, documents, and computer safe while using Wi-Fi hotspots.
|
89. | - Security Advocacy and Awareness: Creating A Secure Culture
- Nov 24, 2004
- All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
|
90. | - Security Features on Switches
- Jul 4, 2008
- This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
|
91. | - Security Financials: The Core Element of Security Business Proposals
- Jun 10, 2005
- Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
|
92. | - SSH Security Primer: Client Security
- Feb 16, 2007
- John Tränkenschuh provides a quick survey of SSH client security issues and suggested configurations for the reference SSH distribution, OpenSSH.
|
93. | - SSH Security Primer: Server Security Settings
- Feb 23, 2007
- John Tränkenschuh describes the settings and implementation details important to your OpenSSH server installation. Because an OpenSSH server functions as a VPN gateway as much as a means to transfer files and invoke commands remotely, it's important to get this right.
|
94. | - SSL VPN Design Considerations
- Jun 10, 2008
- This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.
|
95. | - The Bad Guys from Outside: Malware
- Apr 29, 2010
- In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
|
96. | - The Basics of the Cisco PIX Firewall
- Feb 15, 2002
- The Cisco PIX firewall is a fairly simple device to configure, but you need to be familiar with the basic commands to install and secure it properly. In this article, Andy Fox covers the six commands needed to secure this firewall.
|
97. | - The Building Blocks in a Cisco NAC Appliance Design
- Jul 8, 2008
- This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
|
98. | - The Cisco IOS Firewall Feature Set
- May 1, 2002
- Anu Tewari covers the basic components of the Cisco IOS Firewall Feature Set and tells how it can help a business guard against security breaches.
|
99. | - The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
- Oct 7, 2010
- USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
|
100. | - Tips to Secure Your Home Wi-Fi Network
- Jul 10, 2009
- Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
|