Network Security guide for the home or small business network – Part 20 heterogeneous networks



One thing I’ve already mentioned in this serious is using alternative programs like Mozilla Firefox instead of Internet Explorer, or Thunderbird, Eduora instead of Outlook Express. Even if you’re not using alternative software as your primary web browser, email program there are advantages to having networks with mixed software, operating systems and even mixed network hardware. Back when the blaster worm hit, there were stories of businesses paralyzed when every Windows XP machine in the place (read – EVERY machine in the place) could not stay up long enough to download a fix. In order to get a fix they had to get online to find out about it and it was crashing within 30 seconds of booting.


There were also stories of those that used linux workstations, or livecds like knoppix to save the day. Basically, the blaster worm ONLY affected Windows and everything else was workable and usable to find fixes to solve the Windows worm problem. Personally, I like having options….

This is one of the reasons I think that open standards are important. For web browsers this means sites designed to a standard that all browsers interpret. We have those kinds of standards for mail servers, just competing implementations of the standard. Any program these days that opens documents from a source outside the local machine is susceptible to exploit…. email clients, web browsers, office applications, pdf readers, media players…. etc. It’s nice to have more than one installed.

For that matter, network hardware is something that contains it’s own software to run. That software can have vulnerabilities of it’s own. Certainly it’s worth keeping up with firmware updates for that hardware. It’s probably not a bad idea to diversify the network hardware as well. If you have 20 wireless access points made by the same company and discover that they have the same vulnerability that will make life much more difficult than if you discover that 7 out of 20 are affected by a vulnerability.

Anyway, these aren’t hard and fast rules, but will likely make life easier when worms and exploits bite. It does take more to keep track of updates across a larger list of software and hardware but well could be worth it.

Related Posts

Blog Traffic Exchange Related Posts
  • Ultravnc for remote computer support A little while back I talked some about TightVNC which for a long time has been my favorite implementation of a remote framebuffer, or remote desktop viewing protocol known as VNC (Virtual Network Computing.) The original VNC (now realvnc) came out of AT&T research labs in the UK and has......
  • Network Security guide for the home or small business network - Part 18 - What about Dialup Users? So, most everything so far has been targetted to high speed internet users or business networks. That means if I use dialup I'm safe. Wrong. For starters, in many ways dialup internet is LESS of a risk than high speed broadband for two main reasons. First, high speed/broadband connections are......
  • AJAX threatening Windows? Long ago there was talk about the desktop not meaning anything anymore and that software would be delivered through the web. Well, it looks as though AJAX has brought that closer to reality. Wired news takes a look at where things are in the arena. Explains what Ajax is and......
Blog Traffic Exchange Related Websites
  • Review Lethal Commission New Software Movie Online (2011-11-11) Review Lethal Commission New Software Movie Online Online Scams Uncovered helps find the best affiliate marketing programs and network marketing companies to join. Find out internet scams and online fraud as we build a successful web around us. November 2011 - Lethal Commission is in truth an online......
  • 10 Benefits of Hosting your Own Blog If you want to create an edge over many of the other bloggers on the web, then one of the best things that you can do is host your own blog. There are a number of benefits of hosting your own blog over having some other service host your blog.......
  • Comparison Between Free Of Charge And Paid Web Comparison between free of charge and paid Web security software has turn into a main subject of discussion amongst probably the most of all computer users recently. Numerous people who have employed both free of charge as well as paid Web security software place their strong opinions. Although many people......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site