Category: Networking

  • Network Security guide for the home or small business network – Part 15 – Security Through obscurity

    I remember many years ago watching a Dr. Who episode where a very important key was “hidden” in a display of many other keys. Kind of like hiding a tree in a forest. This concept is “security by obscurity”. Generally this is considered a bad approach to security. It is a bad approach if this is the ONLY thing you consider. Many examples are security by obscurity are usually thought of as… proprietary applications that keep source code secret so no one can find what flaws exist, using operating systems or programs that are “obscure” or have small market share and are not targetted.

    (more…)

  • Ping not working? try ARP

    I’ll confess to having a lot to learn about IP ethernet networking. I feel pretty comfortable with basic TCP/IP (v4), the concept of UDP vs. TCP ports, ICMP pings, etc… but ARP is something that I haven’t dabbled much with. It is, of course, a layer that TCP depends on. When a machine sends a packet to another machine, it sends an arp packet out to “discover” the hardware (MAC) address of the machine on the other end, so ARP underlies everything. These days ICMP is many times blocked by firewall rules. The default with XP’s software firewall is to block ICMP pings for instance.

    (more…)

  • Network Security guide for the home or small business network – Part 14 – Alternative software

    There are ways that risks can be avoided. Recently, there was what was called a zero-day exploit for Internet Explorer. As I write this, the exploit surfaced 3 weeks ago and tomorrow there will be a patch. The vulnerability would allow remote code execution through a vulnerability in the way javascript is handled. So, for that 3 week unpatched period, Internet Explorer in it’s default configuration is a sitting duck. Well, truth be told, there are other browser vulnerabilities, many unpatched. (That’s a common method for many spyware bugs to install.)

    (more…)

  • Network Security guide for the home or small business network – Part 13 – Your own worst enemy

    Once upon a time I did an article about the biggest computer security vulnerability ever. I’ve also passed along the old “the most dangerous part of a car is the nut behind the wheel” joke. If you haven’t got it yet, the computer user can be the “weakest link”. Let’s face it, you’ve got antivirus, a firewall, all the current windows updates, antispyware and a website pops up. The website looks like Windows security center and says you have a virus and need to get official antivirus software.

    (more…)

  • Network Security guide for the home or small business network – Part 12 – Antispyware

    I’ve talked about Antivirus software as an essential. Today we’re going to look at Antispyware software. There is a difference. By definition a virus is a piece of software that infects other files or copies itself. A worm is a virus that spreads without user intervention. (From one open network port to another for instance.) Spyware is not necessarily in either category. Spyware is the name given to software that tracks online behavior, some may track online searches, some may be more invasive and track anything typed in to the computer!

    (more…)

  • Network Security guide for the home or small business network – Part 11 – Why?

    Alright, so you’re still reading this series and you’re thinking. Look, I’m not protecting national security secrets. All I’m doing is (running a business|emailing my grandkids|using the web for research).

    True, good point. You’re not at the defense department. OK. Let’s say you just use your computer for email and web browsing. That’s low priority stuff right? No sensitive information on your PC? Do you ever do banking online? Yes – then you should be concerned… No? You should still be concerned… here’s why…

    (more…)

  • Network Security guide for the home or small business network – Part 10 – use good passwords

    In a small, trusted network you might be able to get away with weak passwords for file sharing for instance. What’s a weak password? Anything you might find in a dictionary. Most people don’t realize this, but there are programs designed to crack passwords. They’re designed to take a dictionary file and run through it trying every combination possible. It might take a while, but this kind of brute force attack can be VERY effective against a weak password.

    (more…)

  • Network Security guide for the home or small business network – Part 9 – Know your network

    Once more into the breech… Ok you’ve taken account of the software and services on your pc. The next thing we need to talk about is knowing your network. Do you have any wireless access points? Not sure? Print servers? How many pcs? Are any of them portables? Public access? Are all of them secured?

    (more…)

  • Network Security guide for the home or small business network – Part 8 – Don’t be afraid to ask for help

    Deep breath time. We’ve covered a lot of good topics and it’s important at this point to take a close look at what we’ve talked about and think. “Am I overwhelmed?” If so that’s fine. Maybe you don’t have enough time to think about all of this network security stuff. Maybe, no matter how hard you try it doesn’t make sense.

    (more…)