Friday 19 March 2021

Router Role in Networking

 The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based on information learned from a different routing protocol. Route redistribution helps increase accessibility within networks.


What is Routing?
Routing consists of more than sending packets from one network location to another. The routing process also includes learning routes and determining the most efficient ways to handle network traffic.

Routers are configured in several ways that enable them to learn a route. The simplest method is to manually configure static routes. A static route tells the router exactly where to send packets. For example,  a static route tells Router 1 to route packets to Router 2, and then Router 2 is manually configured to send packets to Router 3.

The issue with static routes is that many routes change configurations — and the patch from one router to another often changes as a network grows. You can have thousands of different routes, and if one changes, you could be left manually configuring several routers. This can be a time-consuming process, especially when it comes to larger networks.
 

Thursday 18 March 2021

Rainbow cracking technology in cyber security

 Gone are the days when we have to wait for the days together to recover the Windows account password. Thanks to the rainbow crack technology, now we can crack the passwords in few seconds with 100% success rate.


This Rainbow cracking technology works on simple concept. Instead of computing the hashes for each password dynamically and comparing with the correct one during cracking, password hashes are computed in advance for all character sets. These hashes are then stored in datasets called rainbow tables.

So cracking involves just comparing the current password hash with the pre computed hashes within the rainbow tables and get the associated plain text password. Hence it takes very less time compared to the traditional method of brute force cracking. Setting up the rainbow table for various character sets is just one time activity and may take days or months based on the character set and speed of the machine. Once the rainbow tables are ready, you can feed the password hash to it and get your password cracked in seconds.

In order to recover your Windows user password, first you have to get the LM hash for the target user account. This can be done in many ways. You can use any of the tools such as pwdump, cain&abel or LC5. You need to have administrator privileges to dump the hashes using these tools. If you have lost administrator password itself, then you can boot the system using BackTrack live cd or Windows restore CD and then copy the SAM & SYSTEM hive files (which is located in c:\windows\system32\config folder. Note that your system drive may be different). Next feed these files to Cain & Abel tool to get the LM hashes for the target account.

Wednesday 17 March 2021

Comcast Security Key role in cybersecurity

 Wireless security is becoming more important in relation to easily available Wi-Fi. Securing your household wireless keeps you from being an easy target for hackers who could use your Internet for unsavory purposes. It's easy to get your security key through Comcast.


Step 1
Determine your router or gateway. Your manufacturer, model and number should be on the equipment. See Reference below for the list of Comcast supported equipment.

Step 2
Open your Internet browser.

Step 3
Enter the IP address in your browser's address bar. This will bring up a pop up asking for your "username" and "password." For the Linksys WCG200, for instance, the IP address

Step 4
Fill in the requested information. For a Linksys WCG200, the Comcast defaults are "username:" Comcast and "password:" 1234.

Step 5
Click on the tab marked "wireless" from your Gateway status page. This will take you to "basic wireless settings." On the toolbar, you will see a selection marked "wireless security." Click on the link.


Tuesday 16 March 2021

How to Disable or Uninstall Local Area Connection Properties

 Before we start haphazardly changing our Local Area Connection Properties, let's see what is the difference between enabling or uninstalling the connection properties.


Disable a Property Item:
Disabling a property item means it's no longer binded to the connection you're adjusting. This is the preferred method as opposed to full uninstallation since you can easily re-enable a property item if it's needed in the future - such as; you install a local network to share files from one PC to another and need File and Print Sharing enabled. If you just use your PC to access the Internet and never intend to create or join a network, consider uninstalling some items.

Uninstall a Property Item:
If you fully uninstall a Property item, the Windows queue will be reduced while accessing Internet routines. Admittedly, the speed increases of uninstallation versus disabling will be negligible. However, a property item may act as a filter or longer path for each Internet action, so there has to be something said for less computation (less error risk) while moving data to and from the Internet and your PC.

Find more information : network security engineer jobs

Monday 15 March 2021

What is Information Security Management in networking operations

 Candidates should note that even though most frameworks for information security show the development of an IS program as starting with risk assessment and identification of control objectives, this may change depending on organizational objectives, and may be tailored to achieve the desired outcome, as discussed in ISG.


Candidates will be tested on operational components of a security program. They should have a solid grasp of the various components, including standard operating procedures, business operations security practices and maintenance of security technologies.

Candidates will also be tested on their ability to manage operational components. Sometimes these components fall outside of the information security domain (for example, operating system patching procedures). As such, the ability to communicate with IT, business units and other organizational units will be a plus for candidates. Examples of operational components that candidates will be tested on include:



  • Identity management and access control administration
  • Security event monitoring and analysis
  • System patching procedures and configuration management
  • Change control and/or release management processes
  • Security metrics collection and reporting
  • Maintenance of supplemental control techniques and program support technologies
  • Incident response, investigation and resolution.

Wednesday 10 March 2021

What is DHCP

 Windows Server upgrades are never simple. There are lots of connections and dependencies, and everything needs to be handled correctly to avoid introducing problems that turn an upgrade into a nightmare. With upcoming Windows end of life dates in mind, let’s take a look at one of the services you need to upgrade: DHCP.


DHCP Defined
DHCP stands for Dynamic Host Configuration Protocol. All devices on a network need an IP address to access the network and services; DHCP makes managing those addresses automatic. This eliminates manual effort that would be required to assign address, modify them when a device is moved to another subnet, and reclaim them when devices are removed. Along with eliminating the manual work, DHCP eliminates the inevitable configuration errors when addresses are managed manually, such as two computers being assigned the same address.

Using DHCP requires a server that owns the pool of addresses and assigns (“leases”) an address to clients on the network.

Upcoming Windows Server End of Life Dates
Understanding how to upgrade DHCP is particularly important if you’re running Windows 2008 or Windows 2007; the end of support date for both is January 2020. That means Microsoft will no longer provide security updates for that version after that date, so not upgrading exposes you to ongoing, increasing security risks.

Which version should you use?
Although extended support for Windows 10 is available until late 2025, mainstream support ends late 2020, so it’s worth beginning to think about upgrading that version now, rather than making it your new target. Similarly, Windows Server 2012 is already in extended support, so it’s not a good choice for your new version. 

Tuesday 9 March 2021

Security And Information Assurance in networking

 Security and information assurance refers to policy and technical elements that protect information systems by ensuring their availability, integrity, authentication, and appropriate levels of confidentiality. Information security concepts occur in many areas of computer science, including operating systems, computer networks, databases, and software.

Operating system security involves protection from outside attacks by malicious software that interferes with the system’s completion of ordinary tasks. Network security provides protection of entire networks from attacks by outsiders. Information in databases is especially vulnerable to being stolen, destroyed, or modified maliciously when the database server is accessible to multiple users over a network. The first line of defense is to allow access to a computer only to authorized users by authenticating those users by a password or similar mechanism.

However, clever programmers (known as hackers) have learned how to evade such mechanisms by designing computer viruses, programs that replicate themselves, spread among the computers in a network, and “infect” systems by destroying resident files and applications. Data can be stolen by using devices such as “Trojan horses,” programs that carry out a useful task but also contain hidden malicious code, or simply by eavesdropping on network communications. The need to protect sensitive data (e.g., to protect national security or individual privacy) has led to advances in cryptography and the development of encryption standards that provide a high level of confidence that the data is safe from decoding by even the most clever attacks.

find more : cyber security engineer education

Router Role in Networking

  The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based...