|A way to transfer data between to 2 computers who are both behind firewall/router via a 3rd host wich is accesible by both computer|
| by: TroPe - 2004-12-17 20:59:56|
|In this rather long article (sorry), we are going to look at the three common techniques that a hacker may use to compromise your network. By becoming familiar with the methods used by such attackers, you may better be able to defend your network.
Dial-up users: there are a lot of diagrams in this one, so please be patient.
|Cisco routers are often over looked during security audits and security planning; however, a border router is often the first device between the local network and the internet. If a hacker penetrates and controls a border router, he controls the entire network.
A lot of people don't think routers need to be protected. They are completely wrong. Many security problems appear all the time against Cisco routers, and many of them are vulnerable.
|This guide describes the procedure for recovering an enable password or enable secret passwords.
These passwords are used to protect access to privileged EXEC and configuration modes.
The enable password password can be recovered but the enable secret password is encrypted and can only be replaced with a new password.
|Netstat is a windows shell command to show you whats happening on your network connections.|
|The FULL lowdown on the Sasser network worm. (Variations not included as this is a profile of how the original virus works)|
|This is yet another short (but useful) article spawned from a co-worker asking me. By the end of this you’ll (hopefully) know the difference between bandwidth and throughput and how to calculate both!|
|Alright, just to let you know this isn’t extremely indepth. It’s meant as “Brief Introduction” (/me points to the title) for those who have an idea of what subnetting is.|
|PPP or Point-to-Point Protocol is the successor to SLIP (Serial Line Internet Protocol), in this article we will explain PPP and explore it's two most popular authentication methods PAP, and CHAP. |
|Chawmp writes "TCP/IP is a set of protocols used by computers connected to computer networks, such as Local Area Networks and the Internet. This report aims to give a detailed introduction to some of these protocols, and provides sources of further reading where the topics covered can be expanded upon."|
|Yet another nice e-book this time about the TCP/IP and Internet basics presented by one of my favorites authors, Assistant Professor Gary C. Kessler.|
|The ISO-OSI Networking Model is the stuff of textbook all over the world.
An understanding of the different layers and their relevance to the common networking model are mandatory on most computing courses, heres a summary of the model.
|A new type of wireless internetting is launched in The Netherlands, Radio Waves, this type of internetting provides a type that has low setup costs and low monthly fees. |
|This is a fairly straightforward introduction into subnetting. Shows, using a simple example how to implement a subnet on a class b network.|