Virtual Systems, Real Security Holes

As businesses seek new ways to cut costs, IT departments are often placed on the hot seat, and that has fueled interest in virtualization. For example, VMworld 2010, held in San Francisco recently, drew more than 17,000 attendees and saw more than 145,000 virtual machines deployed. However, as businesses rush to virtualize, they too often tend to sweep security under the carpet, figuring they'll deal with that problem later. A survey conducted jointly by Altor Networks and Juniper Networks at VMworld 2010 found that the cost-cutting mindset is pushing organizations toward virtualization at the expense of security and risk mitigation....


Wireless Security For Linksys WRT54G Router Setup

Keep unwanted neighbors and nearby laptop users for stealing access to your Internet connection. You can never be certain of what wifi theives are doing under your account. Even if their activity is not questionable they are still taking up your resources without permission. Here are the step-by-step instructions to secure wifi on your Linksys WRT54G wireless access point to prevent intruders: Log in to your router by opening your web browser and going to http://192.168.1.1 - this is the address to acces your router. If this is your first time logging in, leave the username field blank and enter 'admin' (without the quote marks of course)...


Cisco RVS4000 4-port Gigabit Security Router - VPN

Secure and Speedy Network AccessThe Cisco RVS4000 Gigabit Security Router delivers secure, high-speed network access with switching capabilities to help staff in small businesses safely connect to required resources. IPsec VPN capabilities allow employees working remotely to access files and email as securely as if they were in the office. Fast Gigabit speeds, internally and externally, allow your employees to send and receive large files quickly and easily. Strong security features include a proven firewall with an intrusion prevention system (IPS) that scans deep—detecting and blocking most worms, Trojan horses, and denial-of-service...


Basic Cisco Router Security

This document describes some basic security tips for Cisco routers. The tips are based on my experiences regarding routers during the time I was employed by Philips Communication and Processing Services, Origin IT and Atos Origin. These tips are basic tips to harden your network devices, but they are not the ultimate set of things to do. Keeping in mind how an IP network works and keeping your skills up to date with general networking- and security-mailing-lists is a must. Network layoutFor this document we have the following layout of the network:    The following assumptions regarding network design are made: There is...


Pages 3123 »