IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Scheduling Change of Passwords

27 April 2011 By Saran

If you are in charge of network security, one thing you may want to consider as far as laying down the law in safeguarding your network is the regular change of user passwords to avoid potential hackers and cracks based on how their passwords can be easily guessed.

For some users, it is easy to figure out their passwords. The normal passwords that people use include:

1. Birthdays
2. Anniversaries
3. Car Plate Numbers
4. Mobile Phone Numbers
5. Adding 123 to their names, or
6. Using “PASSWORD” as their password

Now there will be a lot of potential combinations depending on the length of the password. That is why the longer passwords (8 alphanumeric characters) are encouraged for users who access the network.

But while the probabilities of guessing or cracking passwords offer a lot possibilities, employing a regular maintenance as far as changing them is indeed something ideal to combat these hackers or malicious people from gaining access to the network and the programs in use.

Once cannot avoid the fact that some people’s curiosity and call for fame are the main reasons for wanting to be a hacker or code cracker. It is evident in people who are looking to try out their skill. They don’t think of the outcome which can cause a lot of problems.

So one good tip to avoid being hacked is to think like one. Once you do, think of security policies that can make it hard for you to breach a system. That is the best way to stay efficient in your line of duty in any organization.

Filed Under: IT Security Basics, Network Security, Security Policies Tagged With: network, passwords, security, systems

Security is Responsibility of the User

8 October 2010 By Saran

We keep on talking about how important it is to build on security for our computer and our network but we fail to realize that it will ultimately lie on how responsible the assigned user will be when it comes to safeguarding his username and password as far as access to the computer or network is concerned. Apparently, there is always a human error in these cases and if we look at some news briefs, we will notice that majority of hacking or intrusion issues originate at the hands of one person.

This is not actually saying that an assigned user has the ability to control or have companies at the tip of his fingers. Remember, one act of illegal practice can be a cause for legal action. In fact, it is easier to uphold the law on such a person to safeguard the interest of a company. So either way, no person in his right mind would want to bear the burden of being sued and taken to court for something that was bestowed upon him with complete trust.

Hacking is one thing but divulging is another. This is a practice that should be corrected in most cases. People fail to realize the importance of their participation in a network. No matter how great a security barrier is against any outside intruders, security protection includes making sure that the trusted employee is indeed a reliable one. In short, cleaning up the bad vibes and potential threats start internally rather than external.

Filed Under: IT Security Basics, Network Security, Security Policies Tagged With: computer, legal action, network, password, security, username

Flaws in Domain Name Service Providers

6 August 2008 By Saran

If you think a website has problems as far as security issues is concerned then better check out the domain names as well. Why these domain name service providers are the least things that can create problems to network security issues, apparently there are flaws that many would find interesting to hear about.

A large number of network security professionals have been gathered in Las Vegas for the annual Black Hat computer security conference and among the main topics to be discussed include the most anticipated presentation of IO’s Dan Kaminsky regarding flaws in the Domain Name Service software.

The flaw was reportedly discovered quite some time ago but was kept under wraps. So now, the participants over at the Black Hat computer security conference will learn first hand about the details of this flaw.

As a professional, you would think that these issues didn’t even cover domain name handling. But apparently in the world of technology, nothing is excluded. You just never know what to expect and if you value computer and network security, it would be best to cover all aspects starting from your software all the way down to the least expected components of your IT infrastructure. You just never know what could possibly be contracted and it may become a big issue in the long run.

The most anticipated presentation at the show, however, will be IOActive’s Dan Kaminsky when he unveils details of the flaw he discovered in Domain Name Service software. The flaw had been kept under wraps in an attempt to proactively convince major network suppliers and operators to patch the flaw before information about it was made public. Unfortunately, the flaw was leaked to the public on a blog site, and the race was on to patch servers before hackers could exploit the vulnerability.

Source

Filed Under: Network Security, News, Operating Systems Tagged With: domain names service, domains, internet, network

Breaking Codes, Breaking Rules… Is it Prestige or Trouble?

5 March 2007 By Saran

Hackers, code breakers and some people who want to try out their best interest in the line of penetrating the supposedly well-secured network infrastructures that large business empires have on the web will always be the target of people who want to prove a point on their capacity to override such challenging securities.

Code Breakers and Hackers

To programmers and people who are up to date with technology, such an outlook can be fulfilling to their curious personality aspect but could also be asking for trouble. Breaching security walls is like intruding in high voltage areas where people would never experience a normal life once again once they are caught.

Hackers and code breaking individuals have made it a point to try their hand in determining up to which content they can call themselves geeks or nerds in technology and breaking a password or security id is something that is definitely up for them to consider. But hopefully, they would know the consequences for such as privacy of their lives may eventually become intruded in the future as well.

[tags]hackers, security, network, coding, code breaker[/tags]

Filed Under: IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies, Tips Tagged With: code-breaker, coding, hackers, network, security

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security