Skip navigation.
Security Folks: The mission of this site is to assist security folks in their endeavors. If you know the answer to any of the users questions, please take time to respond with the answer. You can also submit security related tips, tricks and articles on this site.

How to Install Checkpoint Firewall NGX on SecurePlatform:

This is a step by step guide on how to install Checkpoint Firewall NGX on a secureplatform device. This article covers the basic installation part of the Firewall of the Firewall including the Enforcement Module and the Smart Center. A standalone installation is covered in this article, which means that enforcement module and the smartcenter are on the same machine.

HOW VRRP works

VRRP means Virtual router redudancy protocol. I am telling you in very general language not in too technical.

Assume that you have a two firewall in HA mode .

NGX means for Checkpoint

Checkpoint communication ports

Port No. Name in Service Manager Short description
256 /tcp FW1 Check Point VPN-1 & FireWall-1 Service
- Download of rulebase from MM to FWM (4.x)

DNS and forensic tools resources

• DNSMap - DNS Subdomain Brute-force Tool
• Dnsgrep - DNS Enumeration Tool
• txdns - Aggressive Multithreaded DNS digger/brute-forcer
• Mscan 1.0

Upgrading Nortel Switched Firewall

Nortel Contivity Image Upgradation

Upgrading the Image of the Contivity VPN Router:

1. Acquire the image v5_05.241 (128 bit) in the optimized format (.tar extension).

Network Security Tools

Penetration Testing
1. Nmap Port scanner Windows and Linux
2. Nessus Vulnerability Scanner Windows and Linux
3. Xprobe Operating System detection Linux

Secure Passwords Keep You Safer

Ever since I wrote about the 34,000 MySpace passwords I analyzed, people have been asking how to choose secure passwords.
My piece aside, there's been a lot written on this topic over the years -- both serious and humorous -- but most of it seems to be based on anecdotal suggestions rather than actual analytic evidence. What follows is some serious advice.

The most common hacker is probably sitting in the cubicle next to you

I’m often asked: what’s the most common type of hacker and attack? Over time I’ve discovered that the general public holds a somewhat romantic image of hackers. One mental picture involves an emaciated young man in a poverty-stricken corner of the world. Greasy-haired and red-eyed, he types late into the night on an old TRS-80 workstation, trying desperately to get your American Express account number for nefarious purposes.
Another favorite image is of a cherub-faced pre-teen with extreme computer skills and little knowledge of law and order. Thanks to too much hardware and too little parental supervision, she creates a new virus that brings down every business on the Eastern seaboard.

What is IDS?

IDS is an acronym for Intrusion Detection System. An intrusion detection system detects intruders; that is, unexpected, unwanted or unauthorized people or programs on my computer network.
Why do I need IDS? A network firewall will keep the bad guys off my network, right? And my anti-virus will recognize and get rid of any virus I might catch, right? And my password-protected access control will stop the office cleaner trawling through my network after I've gone home, right? So that's it - I'm fully protected, right?

Generating the Perfect Password

This is an idea I’ve been rolling around in my head for some time. Now that I have a blog, I can finally share it with you:
For years, system administrators and savvy users have needed to create long passwords to thwart password guessing attacks. However, those passwords are complicated and hard to remember. Is there a way to create strong, easy to remember passwords that are impervious to most attacks? Yes, thanks to something I call the compound password. It’s very simple, but also incredibly powerful.

10 Steps to Make Your Personal Firewall More Secure

"The Clapco D29 is the most impenetrable lock on the market today. It has only one design flaw… the door… must be closed!" –Seinfeld (1990)
After installing an expensive alarm system in his apartment and then getting robbed, Jerry Seinfeld learned a valuable lesson: no matter how good the security system, if it isn't used correctly, it is completely ineffective. That lesson holds just as true when it comes to everyday computer users and their firewalls.

Data reassembly with Ethereal

This is a article that would show how to reassemble a packet using Ethereal.There are a few things you’ll need in place to begin.The first, is a packetsniffer, Ethereal. Why Ethereal? It’s free. It’s cross-platform. It doesn’t require a server OS. And it has one key feature that makes the process easier.Along with Ethereal, you’ll need a text editor – and those that ship with a Windows OS wont’ work: notepad,Word, wordpad – none of those will suffice, because even notepad modifies the data just enough to corrupt what we’re trying to accomplish. I’m going to recommend a tool that works for me: Textpad. So, with a packet sniffer, and Textpad, we’ll be good to go.

eMail Encryption for the Lazy

Encryption is no longer the exclusive domain of flamboyant 007-type agents and shady thugs, playing the sort of cloak and dagger games you'd find in a John le Carré novel. Easy to use software brings it within reach of less conspiciuous types, such as yourself. It's even freely available, to boot.This site is a five step guide that quickly and easily gets you up and running with PGP, the most wide spread e-mail encryption standard. The site is loaded with screen shots, so that you'll get the full picture of what will happen during installation. Hopefully, knowing all this beforehand will remove any barriers you might have against installing the software.




Syndicate content