Network Security guide for the home or small business network – Part 20 heterogeneous networks



One thing I’ve already mentioned in this serious is using alternative programs like Mozilla Firefox instead of Internet Explorer, or Thunderbird, Eduora instead of Outlook Express. Even if you’re not using alternative software as your primary web browser, email program there are advantages to having networks with mixed software, operating systems and even mixed network hardware. Back when the blaster worm hit, there were stories of businesses paralyzed when every Windows XP machine in the place (read – EVERY machine in the place) could not stay up long enough to download a fix. In order to get a fix they had to get online to find out about it and it was crashing within 30 seconds of booting.


There were also stories of those that used linux workstations, or livecds like knoppix to save the day. Basically, the blaster worm ONLY affected Windows and everything else was workable and usable to find fixes to solve the Windows worm problem. Personally, I like having options….

This is one of the reasons I think that open standards are important. For web browsers this means sites designed to a standard that all browsers interpret. We have those kinds of standards for mail servers, just competing implementations of the standard. Any program these days that opens documents from a source outside the local machine is susceptible to exploit…. email clients, web browsers, office applications, pdf readers, media players…. etc. It’s nice to have more than one installed.

For that matter, network hardware is something that contains it’s own software to run. That software can have vulnerabilities of it’s own. Certainly it’s worth keeping up with firmware updates for that hardware. It’s probably not a bad idea to diversify the network hardware as well. If you have 20 wireless access points made by the same company and discover that they have the same vulnerability that will make life much more difficult than if you discover that 7 out of 20 are affected by a vulnerability.

Anyway, these aren’t hard and fast rules, but will likely make life easier when worms and exploits bite. It does take more to keep track of updates across a larger list of software and hardware but well could be worth it.

Related Posts

Blog Traffic Exchange Related Posts
  • Viruses and worms can come in from many directions For a long time, email was the primary vector for viruses, before that floppy discs carried bugs from pc to pc. Then came network worms exploiting windows security vulnerabilities which led to the rise of firewalls and the increase in viruses piggy-backing into the system through browser bugs. But, any......
  • SONY DRM rootkit - the gift that keeps on giving Well... I said, more legs than a centipede for this one.... It looks as though the uninstaller from Sony is an activex control that may have some SEVERE security implications. The ActiveX invokes a command to reboot the computer (RebootMachine). (Which is likely remotely exploitable). Also it appears to use......
  • Network Security guide for the home or small business network - Part 18 - What about Dialup Users? So, most everything so far has been targetted to high speed internet users or business networks. That means if I use dialup I'm safe. Wrong. For starters, in many ways dialup internet is LESS of a risk than high speed broadband for two main reasons. First, high speed/broadband connections are......
Blog Traffic Exchange Related Websites
  • The Imaginative IT Web Designs Excellent Creative Website Design, Graphic Design, Emblem design, banners design, Make Website from Ready flash template, Make Newer Flash website, Website Promotion and Internet hosting. The Creative IT Website design is undoubtedly an award-winning, full service web site design, search engine optimization, graphic design and website hosting company. We're focused......
  • Review Lethal Commission New Software Movie Online (2011-11-11) Review Lethal Commission New Software Movie Online Online Scams Uncovered helps find the best affiliate marketing programs and network marketing companies to join. Find out internet scams and online fraud as we build a successful web around us. November 2011 - Lethal Commission is in truth an online......
  • Comparison Between Free Of Charge And Paid Web Comparison between free of charge and paid Web security software has turn into a main subject of discussion amongst probably the most of all computer users recently. Numerous people who have employed both free of charge as well as paid Web security software place their strong opinions. Although many people......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site