Chinese Overcome Firewall, Use Facebook

Chinese Overcome Firewall, Use Facebook

By Mike Fossum February 29, 2012 | 2 Comments

For unknown reasons, Chinese web users were able to get past that country’s firewall, and briefly access typically blocked social networking sites like Facebook, Youtube and Twitter. China typically blocks any website its government might deem as a threat to …

How To Earn Ciscos Firewall Specialist Certification

Security is a hot topic in today’s networks, and will continue to be for a long time to come. With that in mind, you must consider adding a Cisco security certification to your resume and firewall skills to your skill set.

Application Layer Filtering (ALF): What is it and How does it Fit into your Security Plan?

ALF, not a nickname for Alfred but an acronym for Application Layer Filtering, is one of the hottest new buzzwords in a jargon-laden security subfield: firewall technology. Firewall vendors are rushing to implement ALF into their firewall products, and/or beefing up their ALF implementations to compete with those of other vendors. But exactly what is ALF and is it a “must have” feature to look for when you buy a firewall, or just another bit of marketing hype?

Are You Well Protected?

Winterthe official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected.

Understanding Microsoft Internet Security and Acceleration Server (ISA) Planning and Optimization

Planning decisions are critical for a successful firewall implementation. Missing some of the most important points when designing a firewall implementation can jeopardize our information integrity and the overall network security.

Windows XP Internet Security for Advanced Users

Your computer keeps crashing and your internet connection is slow. Pop-ups are filling your desktop with messages that you don’t want. You need to take control and protect your internet connection before it’s too late.

An Introduction to Network Firewalls and Microsoft Internet Security and Acceleration Server

Everyone needs a firewall. If you run a web site, have a dial-up connection or control a corporate backbone you have to install a firewall. This will allow the control of what internal information from your network or computer is allowed to go out, and what information is allowed to come in. Taking advantage of a simple firewall installation can help you preserve your data and report all attempts of unauthorized access.

SonicWall Firewall Provides Content Filtering for Networks

Recently, I was asked to help a school install Internet access for the classroom Macs. They already had an Ethernet network installed. I recommended DirecTVDSL (formerly Telocity) as the provider and ordered their DSL service. One advantage of their service over some cable and DSL providers is the provision of a fixed IP address. So if the school wanted to host their own website, it would be possible. Service was connected in less than 2 weeks. [Update: In December 2002 DirecTV DSL announced they would cease operations, at this time Bellsouth looks like the preferred replacement vendor].

Getting Started with the Cisco PIX Firewall

This sample chapter covers exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-511) including user interface, configuring the PIX Firewall, time setting and NTP support, and DHCP server configuration.

Software vs Hardware Firewalls – The Basics

Was that the right decision? That is a problem not many think about when it comes to protecting their computer or network with a firewall. Although both software-based firewalls and hardware-based firewalls attempt to do the same thing, they perform in different ways.

Microsoft warns of firewall vulnerability

Microsoft Corp. warned customers of another security vulnerability on Wednesday, this one affecting its Internet Security and Acceleration (ISA) Server 2000 firewall and Web cache product.

Why You Need A Firewall NOW

Hackers are getting more sophisticated in entering computers without permission, and once they are in, they have access to every bit of information on your computer, plus the ability to “hijack” it and control it.

Depending on what the hacker wants to do – he can pull out all your personal information, passwords, social security number, credit card numbers, and all the sensitive financial information you keep on the computer. If you are doing taxes on the computer – they can pull all your sensitive information from those. This can be used to steal your identity. You can find charges made against your credit cards, or even that your driver’s license has been reproduced and is being used by someone else. You house title may be transferred to someone else. It is a huge crime these days, and hurts people for many years.

Armoring Solaris

Firewalls are one of the fastest growing technical tools in the field of information security. However, a firewall is only as secure as the operating system it resides upon. This article is a continuation of the original Armoring Solaris article, focusing on building a minimized Solaris 8 64-bit for CheckPoint FW-1 NG firewall. This article does not include an updated script for the automated securing of the new installation, as there was in Armoring Solaris. Instead, we will be using Solaris Security Toolkit (JASS). This is a new tool developed and released by Sun for the secure deployment of the Solaris platform. In otherwords, I’m not going to develop a tool to automate the secure build since that tool is already out there.

Internet Storm Watchers

Most of us are content with the protection a firewall affords us, and don’t bother to analyze the data the programs collect. Which ports are being probed? How often? Is the same source IP repeated with alarming frequency? We rarely check. The information locked away in those unexamined log files could potentially prevent script kiddie rampages, stop the spread of malware, and even help track and prevent hacker break-ins. And yet those files go largely unanalyzed, especially by home users. The firewall does its job, and we’re satisfied.

Implementing a Bridging Firewall

What is the difference between a bridging firewall and a conventional firewall? Usually a firewall also acts as a router: systems on the inside are configured to see the firewall as a gateway to the network outside, and routers outside are configured to see the firewall as the gateway to the protected network.