Skip to content

2011

Understanding UDP

Forever ago I talked about TCP (Understanding TCP) and I said that in that post that UDP would be another day, well this is the day where we get to understand UDP, which stands for User Datagram Protocol. UDP is the total opposite of the TCP communication. UDP in short sends information or data without notifying the receiver that its sending data. UDP is considered a connectionless protocol, and does not guarantee the reliability or order the packets like TCP does. Therefor packets may be dropped and are never recovered.

Understanding Zone Based Firewalls

Earlier we talked about using CBAC (See the post Understanding CBAC) the "classic firewall" and we mention some information about zone based firewalls but not nearly enough. So today we will be talking about zone based firewalls. Why are they different? We also will learn the basics about what is zone based and what are the advantages compared to CBAC.

Common Network Attacks

Network attacks have always been around but they are getting more advanced every day. These attacks are also easy to set up and use. In the past these types of attacks would have to be pulled off by someone who really knew about computers and to know what they are doing. That's a true hacker, now there are programs that do the same damage and sometimes more with a couple clicks of a mouse, so now anybody can bring down a network. The only thing that changes is the motivation of the person. Some People that run scripts or programs don't always know what the program does, so they click on some buttons and the program does its thing, if it fails sometimes the person stops there and gives up. But there are people who want to do some real damage to a company these people usually have organizations like the Anonymous group. So what are some of the common attacks people or organizations do? Well in a company the network administrators might focus on the outside of the network, but have their inside network unsecure or extremely weak. So if somebody on the inside was able to execute and attack it could have a huge effect on the network. So attacks that could occur:

How a Router Routes

This tutorial will be going over the basic information of how a router routes IP packets. Routers are used in the OSI layer three or the network layer. These routers have IP addresses and forward IP packets to the proper destination. This guide is somewhat basic and is assuming you have some information of how IP addressing works and along with what routing protocols are. So let's focus first on how a host or a computer forwards traffic and then look at how a router forwards traffic. Computers forward or send packets based on these two steps.

Cracking WEP

BackTrack is Linux  network security audit tool for security professionals. This tool is used for testing and penetrating networks. That being said** This tutorial is for educational use only. This is meant only to teach that WEP is an insecure option, and is recommend to use a harder encryption. Using this tutorial on a network that you do not have permission to access or is not yours, could be illegal! ** This was tested on BackTrack version 4 and the steps outlined in this tutorial were successful. (this tutorial is assuming that you have BackTrack 4 installed and are ready with a shell prompt)

Telecommuting Services

This post is going to talk about the major technologies that make Teleworking or also called telecommuting possible. This is when an employee performs his or her job away from the office, usually from their home office. By doing this it allows personal convenience, less travel to and from the workplace. At an Organization level it provides continuity of operations, Secure, reliable and manageable access to information, cost-effective integration of data, voice, video and applications. Broadband refers to advance communications systems that can offer high-speed transmission of services, such as data, voice, and video over the internet.

Crossover or Straight through?

The EIA/TIA puts the standards in UTP cable, and when cabling a network there are two standards. T568A and T568B these standards are important when deciding to put a crossover cable or straight through cable This tutorial is going to be talking about when and where to apply these different standards. We are going to be focusing on the UTP cable and with the RJ-45 connectors; in order for the communication to work properly we need to make sure we understand where to put these cables.

Cisco IDS vs. IPS

There are tons of network attacks out there. Using a firewall helps but does look for signature based attacks. Access Control Lists are like firewalls and only look at the protocols like HTTP, FTP POP, etc. Cisco has developed some tools that will help network administrators combat the issue; IDS, (Intrusion Detection System) and IPS. (Intrusion Prevention System) Let's go into IDS first, Cisco IDS is a physical device and is like an alarm system it will alert you when an attack happens but that's it, the system won't block the connection. The IDS system is deployed in promiscuous mode meaning the sensor is placed where it can hear all the network traffic but is not in direct connect with the network making it an advantage when using an IDS:

Laser Printing Process

Let's move away from Cisco for at least a day, So this post will be talking about the six steps in the laser printing process, this is good for technicians who fix or repair printers along with a good learning experience. With my limited knowledge of printers I used this process to at least help diagnose the problem.