Components, Processes, and Implementation of IDS
Regardless of what IDS you select, they all have certain components in common. It is important to have a general understanding of these components.
Networking Basics
A network is simply a way for machines/computers to communicate.
At the physical level, it consists of all the machines you want to connect...
Modern Encryption Methods
Modern methods of encryption are more secure than the historical methods discussed in the previous section. All the methods discussed in this section are in use today...
Session Hijacking
Another form of attack is session hacking or hijacking. TCP session hijacking is a process where a hacker takes over a TCP session between two machines. Because...
Approaches of Network Security
Organisations can choose from several approaches to network security. A particular approach, or paradigm, will influence all subsequent security decisions and set the tone for the entire...
Introduction to Network Security
Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people with bad intention could...
Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...
Basic Network Utilities
Ipconfig
The first thing you want to do is get information about your own system. To accomplish this, you must get a command prompt....
All about Proxy Servers
What's a Proxy Server?
An intermediary worker goes about as a door among you and the web. It's a mediator worker isolating end clients...
Windows Firewalls
Windows first started shipping a primitive firewall, called Internet Connection Firewall (ICF), with Windows 2000. It was very simple. Each version of Windows since then has expanded...