To keep readers updated
LATEST POSTS
Passive Information Gathering in Network
As a result of the widespread use of internet technology, technology constantly renews itself and new systems emerge. The most common regulations of these technologies are devices such as uninterrupted web servers, firewalls, web application firewalls, IPS devices and Load Balancer.
DOS Attacks on SSL Service
Important information (such as e-mail address, credit card information, ID number, username and password) must be transmitted encrypted during transmission. HTTP is a clear-text protocol and can be configured as HTTPS, protected by SSL/TLS. Cryptography algorithms can provide a certain level of protection depending on the strength of the algorithm.
Blocking Malware with DNS Sinkhole
The DNS sinkhole method can be used to prevent malicious software from communicating with the command center or to detect infected systems. The sinkhole method can also be used to detect or neutralize the impact of botnets. In this article, the use of the DNS sinkhole method to prevent malware in corporate networks is discussed.