Category "Cyber Security Knowledge Base"

Scope of article

When it comes to securing network infrastructure, it is a common trend to invest into commercial grade appliances. It is found that security designers tend to ignore built-in security features available within a FOSS distro. This article explains few such features and helps decide when and how to use those in a given network scenario. […]

Scope of article

SSH service is very widely used in the open source infrastructure setups. Due to its small footprint on network, as well as ease of installation and maintenance, SSH replaces many remote shells in the modern data centers. OpenSSH is a very famous flavor of this protocol, and this article talks about such challenges and solutions.
[…]

Scope of article
In the last article we talked about Tripwire, which ensure the integrity of file system. In this article we extend the security from operating system and application files to one level further down. Disk encryption is a technique predominantly used in critical open source infrastructures. TrueCrypt is a utility widely used for this purpose. […]

Scope of article

With the increasing demand of cyber security in open source world, it has become important to know all the methods and tools available. There are many tools available, which can either be used manually, or embedded in a script to perform the automated security related tasks. With this article we are starting a mini-series of such security tools, where we will talk about small and useful security utilities available for open source systems. […]

Scope of article

Today’s web hosting data centers are deployed with multiple web servers, running heterogeneous operating systems architecture. With ever increasing online businesses, it is important to know how many customers are really reaching to your websites. Beyond just the number of web hits, it is now imperative to know the trend of customers needing web analytics. […]

Scope of article

In the previous articles of this series we covered common attacks found in most of the infrastructure vulnerability exploitation scenarios. This article takes a step forward, in terms of describing a technically advanced attack which can badly impact networks because it is tough to detect it. […]

Scope of article

We will also learn how to use various methods to achieve the same, using FOSS based solutions.

How cryptography works?

As we all know, the heart of cryptographic network communication is the public key cryptography (PKI), which is used to encrypt the TCPIP communication between two network end points. PKI uses various encryption algorithms to ensure data security. […]

Copyrights ©2008: Valency Networks Pvt Ltd.