Tag: Security
Best Practices for VM Server Failover [on hold]
I would like to set up a small server, for a small company, on which would live several virtual machines including:
-A Windows test environment for support technicians
-centralized logging server(s) for remote and local Windo…
Push notifications still come through, even without active internet connection [on hold]
I’ve had this on a couple of Wi-Fi networks, where I am connected, but not logged in for internet access. But I still get push notifications on my mobile from certain apps. But it seems to be different apps on different netwo…
Protect Cisco C3560CX switch from unauthorized access on remote location
I have to extend our corporate lan to remote location on which we can not control the physical access to the switch.
What are the best practices in this case/scenario? So, I will shut down password recovery. I will shutdown …
How to close ports in a router?
I am using a router given by my ISP and when I did a scan nmap -sS -p1-65365 192.168.1.1 I got below result
PORT STATE SERVICE
21/tcp open ftp
23/tcp open telnet
80/tcp open http
7547/tcp open unknown
I use router only for…
How To Create Account For Netgear Extender [on hold]
Netgear Ex3700 Setup If you are using a Brand new Netgear extender before make your extender usable it needs to create an account first. For that buyer have to plug the extender first and once the Light turn green then you ne…
EAP-TLS WiFi Certificate
I’m hoping to validate a lab design i’m working on for EAP-TLS authenticated WiFi. I want to move away from username and password authentication and to certificate based. The network is limited to internet access only for mob…
Why aren’t we encrypting data on Network level instead of transport level when using e.g. HTTP
Why we are bothering to encrypt our data on a transport level, instead of just doing that on a network level with e.g. IPSec and get rid of the need to to that in upper layers. For example instead of using TLS for HTTP we jus…
Preventing Users to Connect Each Other in a Network [on hold]
There is a guest wireless network. Currently guests can connect to this network and use the internet. But they can also connect each other and it means they can also conduct attack each other.
Is there any way to prevent th…
Security of Spoofed Email
i received an email from my own address does it mean when I send a mail someone else it will also forward a copy of every mail to the inbox who spoofed my mail
Monitoring office network from cloud instance [on hold]
I am exploring using Security Onion to monitor network traffic at my office (and eventually 3 other office locations). We are a start up and don’t have any on prem servers to host the SO instance, so I was wondering if it’s p…