Technologies and tools for safer networks
Is your data safe? Are your borders protected? This month we examine some expert techniques for building more secure networks.
Real admins think about security all the time, and even if you're a casual user, it pays to know what the intruders know. Services that once were safe are now wide open unless you keep current with the changing times. This month, we examine some security strategies from the experts.
We start with a study on how to protect Voice over IP (VoIP) networks from eavesdroppers and other intruders. You'll learn about some of the encryption technologies available with VoIP and get some practical tips on isolating and protecting voice communications.
Next we'll examine the state of wireless network security. We'll present some strategies for how to make the best of a WEP network, and we'll show you how to maximize the security of later protocols such as WPA and WPA2.
Our next article describes how to use one-time passwords to add two-factor authentication to a secure website. You'll learn about the OTPauth PHP library, and we'll provide a detailed example showing how to set up your own online one-time password system.
The last article in this month's cover set looks at hping, a handy tool for creating test packets to explore intrusion scenarios and check the functionality of firewalls. But that's not all. If you're still looking for more inspired reading on security, turn to our Sysadmin section for an interesting case study on how to hack NFS 3.
You'll never have the perfect network or the perfect tools – the world of network security is changing all the time – and since you can never really pin it down, maybe the best strategy is to read on …
Buy this article as PDF
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.