Skip to main content

Home/ Groups/ NTEN225
1More

Cisco: How can MSS help to solve issues in VPN communication | FirstDigest - 0 views

  •  
    Since a week, I'm stretching my brains to solve a communication problem over a VPN connection. The problem was that connections like SSH over VPN were not successfully completed. Imagine site A (Paris - remote end) and site B (Hamburg - local end).
1More

Zone-Based Firewall Sample Configuration - 0 views

  •  
    Zone-Based Firewall Sample Configuration
1More

ScanSafe - 0 views

  •  
    Security monitoring for organizations using SaaS
1More

Cisco ASA Innovation Tracks Botnet/Malicious Activity - 0 views

  •  
    Recently, a security analyst blogged about Cisco's security efforts and questioned Cisco's commitment to the market. As you know, I am not only a Cisco Press author, but I also work as a security consulting systems engineer for the company. From my point of view, Cisco is most definitely not taking its eye off the ball in the security market. But the post did make me think about the kind of questions that readers might have. Is Cisco committed to creating best of breed products or would it rather create security systems? Why should customers get excited about Cisco Security?
1More

How to Make Your VPN Even More Secure - 0 views

  •  
    In the past few years, VPN services have hit the big time-especially among BitTorrent users. These days more and more internet users see running a privacy enhancing service as a requirement rather than just a luxury. They're not always perfect, though. Here are a few tips and tricks that can enhance the security of any VPN.
1More

Open Source Digital Forensics - 0 views

  •  
    The Open Source Digital Forensics site is a reference for the use of open source software in digital investigations (a.k.a. digital forensics, computer forensics, incident response). Open source tools may have a legal benefit over closed source tools because they have a documented procedure and allow the investigator to verify that a tool does what it claims.
1More

CCNA Security: SSL VPNs - The Cisco Learning Network - 0 views

  •  
    Cisco Learning network videos on SSL VPNS
1More

DIY: Free tools for removing malicious software | TechRepublic - 0 views

  •  
    Takeaway: Fighting the malware battle really hurts when you're spending a good deal of your IT budget (if you even have an IT budget) on software to protect machines from attacks. Here's how to do it for free. Malicious software (be they viruses, rootkits, trojans, worms, or malware) are so prevalent it seems one of the primary jobs for IT is the protecting, cleaning, and removing of said software. It seems no matter how hard you try, or how much you pay for the software you use to protect your desktops, it always seems like a losing battle. Fighting that losing battle really hurts when you are spending a good deal of your IT budget (if you even have an IT budget) on software to protect machines from attacks. It doesn't have to be that way. I have found plenty of tools that can help in the quest to have a virus/malware-free environment. These tools can be either installed on your machines or used as a toolkit to carry with you to fight the good fight. You won't find enterprise-grade tools here. What you will find are tools I have found to do the best job at keeping my systems clean. Combofix Combofix is my first line of defense tool when I suspect something has taken over a machine. But you shouldn't just run this powerful tool without a few considerations. First, and foremost, what will Combofix fix? After a successful run of Combofix, you should have cleaned (if applicable): Malware, Rootkits, Trojans, Worms, and Viruses. What you need to know about Combofix, prior to running is quite important. The single most important issue with Combofix is that you can not run it with an antivirus tool enabled. With some antivirus solutions you can simple disable the tool (Symantec Endpoint Protection is a perfect example). One particular antivirus solution, AVG, I have found to require complete removal before running Combofix. And to be on the safe side, I prefer to run Combofix with the computer in safe mode. One other note: Never download Combofix from any oth
1More

Introduction to Zone Based Firewalls V2 - 0 views

  •  
    Introduction to Zone Based Firewalls V2
1More

IOS Firewall - CBAC Scenario - 0 views

  •  
    As the network engineer for your company you are responsible for all network-related tasks. One day your security officer comes to you and asks is you can further enhance the network security. He wants you to implement an IOS Firewall feature to protect incoming traffic
1More

GNS3-Topology: ACL Test Lab for ACLs and NAT/PAT | GNS3 Labs :: Cisco Router Simulator ... - 0 views

  •  
    Full GNS3 And Dynamips Topology Config Files for ACL and NAT/PAT Test Lab ..
1More

Media Monitoring Configuration Guide, Cisco IOS Release 15.1M&T - Configuring... - 0 views

  •  
    Configuring IOS Performance Monitoring
1More

CCIE L2 security, a FRAME of reference… - CCIE Blog - 0 views

  •  
    Some screen captures so L2 security (DHCP snooping, ARP inspection etc..)
1More

IPv6: Why Bother? > The Point of IPv6 - 0 views

  •  
    Good article simplifying IPv6.
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page