background preloader

Security tips

Facebook Twitter

Wireshark · Go Deep. Cisco ASA 5505 Quick Start Guide. 1. Verifying the Package Contents 2. Installing the Chassis 3. Powering on and Verifying Interface Connectivity Interface Connectivity 4. 5. 6. 7. 8. Note Read the safety warnings in the Regulatory Compliance and Safety Information (RCSI), and follow proper safety procedures when performing the steps in this guide. 1. 2.

The ASA ships with a default configuration that includes two preconfigured networks (the Inside network and the Outside network) and an Inside interface configured for a DHCP server. Step 1 Connect one end of an Ethernet cable (not provided) to Ethernet 0 on the ASA. Step 2 Connect your devices (such as PCs, printers, and servers) with Ethernet cables to Ethernet 1 through 7. Connect a PC to the ASA so that you can run the Adaptive Security Device Manager (ASDM). Step 3 Connect Power over Ethernet (PoE) devices (such as Cisco IP Phones or network cameras) with Ethernet cables to switch ports 6 or 7 (the only ports providing power to PoE devices). 3.

Step 1 Step 4 Step 5 Step 6 4. Radia Perlman On SDN, IPv6 & Security. The networking pioneer touched on current hot topics in a keynote speech at the 2015 USENIX Annual Technical Conference. Radia Perlman is a legend in the networking industry, having invented the Spanning Tree Protocol (STP) and then improved on STP with TRILL (Transparent Interconnection of Lots of Links).

With a PhD in computer science from MIT, she holds more than 100 patents and is currently a fellow at EMC. Perlman was the keynote speaker at the 2015 USENIX Annual Technical Conference, held this week in Santa Clara, Calif. Her talk, "Network Protcols: Myths, Missteps and Mysteries" focused on the development of STP as well as her trust models for Public Key Infrastructure (PKI). But in her far-ranging discussion, she also expressed her opinion on some of the hot topics of the day, including software-defined networking and IPv6, the most recent version of the Internet Protocol. Perlman started her talk by encouraging audience members to think critically. More Insights. 4 Keys To A Data Security Strategy. Organizations must prepare for the inevitable security breach and focus on protecting sensitive corporate data. Here are some ideas to build on. If you’re an IT pro, protecting your company’s security may have recently become part of your job description.

This probably didn’t come as a surprise -- more than 40% of companies suffered a breach last year, according to the Ponemon Institute. Maintaining a secure environment is no longer a question of locking down the perimeter or eliminating the chance of an attack. After all, even if you can build a 10-foot wall around your data, someone will always be able to build a 12-foot ladder. While you need to continue to focus on keeping out the bad guys, organizations need to acknowledge the reality that it’s not always possible and develop a plan B when the fail-safe fails. 1. At the highest level, companies are finally starting to get away from the head-in-the-sand approach to data security. 2. 3. 4. More Insights. Software-Defined Storage Vendors Leading The Pack. There's a lot of buzz about software-defined storage, but the market is just emerging.

We pick five vendors that are leading the space. 1 of 7 (Image: Rodyka/iStockphoto) What is software-defined storage? Imagine all of the really smart code -- deduplication, compression, erasure coding, file systems, object metadata, and management systems -- ripped out of those expensive storage appliances and running on virtual instances or containers in COTS servers. In a nutshell, that's software-defined storage. All the palaver about control planes and data services is just to add mystique to a simple, but powerful, concept: The main impact of SDS -- in the near future -- is on the storage hardware business. The rise of SDS also will put an end to RAID arrays.

Longer term, the impact of SDS is in software. This sounds like storage nirvana, but we aren't even close to general solutions that can talk interchangeably with each other through a standard API. More Insights. The Best Password Managers. Two-Factor Authentication: Who Has It and How to Set It Up. Not that long ago, the Heartbleed exploit had us all scared, given that one itty bitty piece of code left everyone's log-in information potentially up for grabs. Here's an explanation of what it does, courtesty of XKCD. If you're afraid a site you visit might still have the exploit, run its URL though LastPass's Heartbleed Checker.

So what is a person afraid for their security to do? Well, you should definitely change your passwords on the sites—regularly! By sheer brute force or simple phishing, passwords are, to be honest, a pretty laughable way of authenticating who you are (or aren't, as the case may be). What you really need is a second factor of authentication.

And that's why many Internet services, a number of which have felt the pinch of being hacked, have embraced two-factor authentication for their users. As PCMag's lead security analyst Neil J. The problem is, we are far from ubiquity on having biometric scanners for fingerprints and retinas as that second factor.