Basic Network Utilities
Ipconfig
The first thing you want to do is get information about your own system. To accomplish this, you must get a command prompt....
Denial of Service Attacks
The first type of attack to examine is the denial of service (DoS). A denial of service attack is any attack that aims to deny legitimate users...
Networking Basics
A network is simply a way for machines/computers to communicate.
At the physical level, it consists of all the machines you want to connect...
Approaches of Network Security
Organisations can choose from several approaches to network security. A particular approach, or paradigm, will influence all subsequent security decisions and set the tone for the entire...
Threat Classification
Your network certainly faces real security threats, and these threats can manifest themselves in a variety forms. There are different ways one might choose to classify the...
Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...
Security Terminology
Security professionals have specific terminology. Individuals or system administrators having experience in network administration are probably already familiar with most of these terms. Although most hacking terminology...
Modern Encryption Methods
Modern methods of encryption are more secure than the historical methods discussed in the previous section. All the methods discussed in this section are in use today...
All about Proxy Servers
What's a Proxy Server?
An intermediary worker goes about as a door among you and the web. It's a mediator worker isolating end clients...
How Firewalls work and Types of Firewalls
To control access to a system we need firewalls. A firewall is a device (usually a router or a computer) installed between the internal network of an organization and...