Network Security – Arp spoofing

Monday, January 30th, 2006

So…. what is arp spoofing (poisoning)…. and what are it’s implications? ARP spoofing involves tricking a machine into thinking that you’re machine is, yet another. Let’s put this in IP address terms. Let’s say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are given another network address – […]

Google explains Google China Decision

Friday, January 27th, 2006

The Official Googleblog has an article today about their decision to filter results in China. I took a look at the Chinese version today (I saw an image search comparing Tienamen (spelling?) results in English and Chinese. I also searched for my site and found that I seem to be absent from the Chinese search […]

Your own wikipedia….

Sunday, January 22nd, 2006

I’ve made quite a bit of use out of the wikipedia in recent years. I know it has it’s flaws (I’ve run across some first hand), but I’ve found typos in textbooks as well. However that doesn’t mean that it can’t be a very useful reference. In fact, in some of my browsing I’ve gone […]

Google Talk federation….

Tuesday, January 17th, 2006

When Google Talk first came out, many people were excited that they were using the protocol that jabber is built on. There were also disappointments that ALL of the protocol hadn’t been implemented. In fact, the biggest disappointment many had was that a jabber.org instant messenger user could not IM with a gmail.com user. That […]

Urgent AOL update

Monday, January 16th, 2006

This sounds like a serious vulnerability. The SecurityFix is reporting on a very serious vulnerability in AOL. The problem affects AOL version 8.0, AOL version 8.0+, and AOL version 9.0 Classic. The vulnerability could allow a remote attacker to take control of a users PC. Basically, all that would be needed is for the AOL […]

Hacking with Google (and without Google.)

Sunday, January 15th, 2006

I found a couple of interesting presentations on network security related topics. Primarily these are about using the internet and search engines for gathering information on specific “targets”. Their very interesting from a “self analysis” point of view as well.    Send article as PDF   

Google rumors galore….

Thursday, January 5th, 2006

There are all sorts of rumors circulating about Google’s product announcements tomorrow at CES. There are still stories floating around about a Google PC running linux and there are stories about pay-download videos and a software bundle. No official word on these from Google. (They had denials about PC talks from some of the retailers […]

What is a Ping?

Thursday, January 5th, 2006

The word “ping” is used in computer networking. It’s usually used to test and see if a machine is able to be “reached” or “talked to” over a network. The terminology reminds me of the concept of radar systems. I have a tendency to think of it as “bouncing a test” off the other machine. […]

Windows Desktop Search

Thursday, January 5th, 2006

I got a first look at Windows Desktop Search today (bundled with MSN Search Toolbar?) I was told that it was new on the system and had not been used. The systems owner didn’t know when it was installed and thought it must have been installed when he did a windows update. It looks like […]

Common Networking Ports

Saturday, December 31st, 2005

Along the lines of “knowing your network” with the network security guide. Here are some of the most commonly used network ports. There are 65535 ports that can listen for a connection, so this is not a thorough listing. (These are tcp unless noted otherwise.)    Send article as PDF   

Google
 
Web www.averyjparker.com