
SSH Tunnels - Linuxlogin.com WebCamsOnAir.com: Search Live Streaming Webcams | Watch Live Online | Live Video Streaming | Streaming Service | Packet Crafting for Firewall & IDS Audits (Part 2 of 2) Introduction This is the second of a two-part article series that discusses various methods of testing the integrity of your firewall and IDS, using low-level TCP/IP packet crafting tools and techniques. Part one showed several examples that tested a firewall (port 80 TCP, and port 53, UDP) using tools like hping and tcpdump. We will now continue the discussion with a third test of the firewall, using the same tools as noted above, and then move on to test your IDS signatures and detection ability. Note that the focus here is on a Linux environment, but the process is similar with other Unix-like firewall/IDS environments as well. Please familiarize yourself with part one of this article before continuing on with this paper. Testing your firewall - third example, ICMP echo requests The example shown below is a simple ICMP echo request to see if a machine is alive, in this case our test machine. This time there is one packet received as was noted above, and the round trip time is shown.
Understanding Camera Lenses Understanding camera lenses can help add more creative control to digital photography. Choosing the right lens for the task can become a complex trade-off between cost, size, weight, lens speed and image quality. This tutorial aims to improve understanding by providing an introductory overview of concepts relating to image quality, focal length, perspective, prime vs. zoom lenses and aperture or f-number. All but the simplest cameras contain lenses which are actually comprised of several "lens elements." Optical aberrations occur when points in the image do not translate back onto single points after passing through the lens — causing image blurring, reduced contrast or misalignment of colors (chromatic aberration). Original Image Any of the above problems is present to some degree with any lens. Note: For a more quantitative and technical discussion of the above topic, please see thetutorial on camera lens quality: MTF, resolution & contrast. ZOOM LENSES vs.
Optimizing NIDS Performance Introduction Network intrusion detection systems (NIDSs) face some of the most gruelling challenges of any security product. Not only is the bandwidth these devices monitor increasing, so are the amount of attacks they must guard against. Review The NIDS Deployment Policy Before doing anything, the NIDS administrator needs to review the current NIDS deployment policy. Filtering Signatures Once the policy has outlined the general strategy that the security staff will implement, the first thing that the NIDS engineer should do is trim the amount of attacks that the NIDS will look for. Signature trimming can remove many unnecessary signatures at a time. Most major NIDSs can be classified as either a pattern-matching NIDS (such as Snort, ISS, Dragon) or protocol-analysis NIDS (such as BlackICE, SecureNet Pro). To determine if a signature is going to perform some pattern-matching, the NIDS engineer should look at the vendor documentation regarding the signature. Figure 1. NIDS Load Balancing
Cheap Surveillance Camera System [DIY] Cheap Surveillance Camera System is a DIY project. I just launched a low cost surveillance camera project, which is named as PCam (Peek Camera). The project is made up of an LPC2100 microcontroller, a serial camera, and an SD card slot. An optional passive IR detector can be connected to the microcontroller as the alert input. Up to now I am using an LPC2142 board for software development. I will not offer the schematics design since such design is available from an existing EV board from Keil (Please check out the links in section Read More). The design challenges of PCam project are SD card storage and Camera modules connectivity. First of all, it is difficult to select the cameras and the suppliers. Second issue is the JPEG format. After the basic PCam project, my partner asks for a feature up version of PCam, an IP Camera with Ethernet connectivity. Read More Keil offers MCB2140 evaluation board with NXP LCP214X.
Armor Your Palace A guide to securing your home and home network with inexpensive hardware, open source software and about 8 hours of dedicated time. This is a living document, updated on a regular basis to reflect additional best practice methodologies, tips and tricks as they become available. In this guide, we will walk you through the process of building and configuring security systems to protect your home and home/office network through the use of motion-sensing digital security cameras, advanced firewalls, intrusion detection systems, and realtime notification mechanisms. In a mere eight hours, we will endeavor to build and configure a moderately sophisticated wired and wireless home or office LAN with a DMZ for public-facing services, strong ingress and egress filtering for all connected subnets and a realtime risk management console with live monitoring and alerts by email and/or telephone! Technorati Tags: howto, linux, privacy, security Planning For your firewall: Additional Software: Implementation
KarKomaOnline - For SysAdmins Intrusion detection and prevention learning guide More on intrusion detection and prevention Threats expert Nick Lewis explains how to prevent data exfiltration via covert channels SearchSecurity.com members gain immediate and unlimited access to breaking industry news, virus alerts, new hacker threats, highly focused security newsletters, and more -- all at no cost. Join me on SearchSecurity.com today! It's no secret that a layered security strategy is the key to protecting enterprise networks from malicious intrusions. This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention . Here, security professionals will gain some insight on the basics of network intrusion detection systems by learning how to determine which IDS/IPS technology is right for their enterprises as well as the key differences between the IDS and IPS technologies.