The Hawking Technology Print Server (HPS1P) is a nice little parallel port to ethernet print server that can be configured to make a single printer available to multiple machines on a LAN (local area network). It supports a number of different protocols and can be configured through a web interface, or with a Windows based control application. There are disadvantages with hooking a printer up to a pc to share over a network. First, the pc that shares the printer has to be up and reliable. Second, that pc has to be in a convenient location to the printer.
Tag: wireless
-
Network Security guide for the home or small business network – Part 7 – Wireless Networking
OK – the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting them to what is absolutely necessary. Now we’ll take a deep breath and get into another area… Wireless network security.
-
Network Security guide for the home or small business network – Part 2 – A Software Firewall
Do I really need a hardware firewall? I’m running XP Service Pack 2 with the built in firewall? (or norton, or zonealarm?) Well, personal firewalls (the name that software firewalls go by) are good for a great many things that hardware firewalls AREN’T. They do have their limitations though and I’ll try to cover those in this post. Of course, a software firewall is running on the pc that you use to connect to the internet and one of the functions it serves is to “close the doors and windows” or those open ports that a computer can listen for connections on.
-
More information on Titan Rain (“Hack attacks”)
Earlier this year there was an article or two about a rumored “hack attack” that was ongoing against US Government (and contractor) computer systems. The stories claimed that the attacks seemed to be coming from China. Today I’m seeing a couple of articles on the topic. First up is an AFP story on the problem it sounds as though little attention has been paid to hardening systems. There is speculation that the Chinese military is involved in the breakins. One incident was very neatly and methodically done, planting a backdoor in 30 minutes.
-
Linux LiveCD for security professionals/penetration testers
I hadn’t heard of this distro before, but read at distrowatch, that Troppix has released version 1.2 of their livecd. It supports many wireless chipsets, is aimed to improve look and feel and include the latest versions of several utilities (nessus, metasploit, aircrack).
-
Mandriva 2006 upgrade on Inspiron 8000 laptop saga Part II
Well the saga continues. I suspect there will be a three as I get all software installed and mention tips and tweaks. III may not be named as such, I may just do a series of articles on little things that I’ve changed. At this hour I’ve got the KDE desktop for Mandriva 2006 up and running and am as I type letting more software install. I’ve had a few bumps along the way and let me tell you about them. First was the bad md5sum on the first disk image… my fault. I expected bittorrent to have checked it and made sure it was correct, but apparently that failed. Again, my fault.
-
New protocol to identify location of access point users?
Intel has developed a new technology that will more precisely identify where a wireless user is. The previous approach has used signal strength to more than one access point as a guage. This new approach uses a time-stamped packet from two access points. The difference between the packet stamp and the arrival time will give a more precise measure of where the mobile user is.
-
More on Wireless networking security
Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are “acceptable” levels of security depending on your circumstance. In other words, if you’re miles from nowhere and feel comfortable with WEP (which is breakable) fine.
-
Good wireless security post
I found this one at The sunbelt blog, very good article referencing a talk on wireless network security by Xavier Ashe.
-
NY requires businesses to disclose security breaches.
The Register writes that New York has passed a law that will require local government agencies and businesses to disclose security breaches. (System broken into or data stolen). I can understand businesses being reluctant to disclose this kind of information. “What will they say about us”, “bad reputation”, “we’ll lose customers”, the thoughts could go on. However, there are some people that respect a business that is up front about a problem like this.