Internet-Link Disclosure Standards: AUL, URN and LEXexclamation Point System
Imagine you are giving a presentation at the local branch of your company. Before the talk, you gather the team to help with setup and you get everyone who couldn’t be with you to RSVP. When the time comes, the boss asks if everyone had downloaded the company’s wireless router. Everyone present spits cotton-candy, because the only thing the router is is a router. Even after many minutes, no one mentioned that they had downloaded anything.
So what do you do? Most of you will pull out your Palantir firewall and check the list of clients on the wireless network. Then you check the whois information for the hosting server, and in particular, the physical address of the STATION.
What you’ll find within the firewall security logs is a list of all the MAC addresses of HOSTS, potentially the SSIDs of interest. You might find traffic analysis reports, too, which will explain some or all of the MAC addresses of clients who’ve tried to connect to your WLAN, and those who’ve tried to penetrate it.
sshtaccess configuration files
Even if you’ve got your firewall up and running, and still have a list of clients associated with your WLAN, you’ll want to check the config files for that network, particularly the access.conf and httpd.conf pages.
Browse to your web server, Internet config folder, and view for these files. Look for any omitted items, or items that are not configured as they should be. If you find any files that say, “Limit Access for all users here” or “Group all computers to this machine,” you’ll have territory secured.
If you find that any of the files that loaded onto your server or client computers are unsecured, you’ll have to expand the access for everyone using the server or client computer. Groups of computers can be given access to a single server or computer. Given the number of computers and servers going live on a small LAN, only certain users of course need to have direct access to the server or computer.
Look inside /etc/httpd/conf/httpd.conf for any sections that reference outside entities. Any reference to a nonexistent or anonymous sender or source will yields false positives for any malicious hacker trying to decode your messages.
Don’t forget, too, about the httpd.conf file that serves as the administrative interface for the site. Check the permissions of this file, as systems that don’t have read access to this file will be set up for directories with 100% ownership. A file with “read access” is practically begging to be hacked into. Make sure the permissions are set correctly. Otherwise, someone with maybe a little knowledge getting to the right endpoint can service a server or site that has been compromised.
If you don’t know what an e-mail interface is or how to create one, consult a friend that has some experience with computers and software that allows you to interface with the Internet from a web client. (This is not recommended for those without extensive technical knowledge.) Such a friend could perhaps show you how to do it, and you could then confirm that such an interface is, indeed, provided by your ISP or developed from scratch.
Hello! So, I’ve been in the business for a few years now. Live on the net, with a patient that is very interested in me, we’ve had several clients that have cracked the code and become securely encrypted cyber entities that can give and receive secure email and passwords via the Net.
The problem is, however, that their main operating system does not have a built in encryption utility that is both simple and efficient. Assuming that the system is ok, I proposed a simple and efficient solution: create your own encryption algorithm from start to finish. Following are four steps:
1. Develop a quick algorithm using a computer and a notebook. Today, one of the best options is to use a OpenPGP software package, such as Earthquake. It is important to note that this is a heavily acted protocol, so you will need to learn about basic cryptosystems to be able to encrypt. The good news is that it is open source, which means that anyone can develop a cryptographic tool of their own, in an illegitimateenge to the original creator, if they so choose.
2. Encrypt your messages using a WEP encryption algorithm. WEP is the utility that was created to replace the earlier Wsec system. WEP has been superseded by WPA, which is sometimes also referred to as WPA-PSK. The new system uses the Advanced Encryption Standard WPA2 instead of the earlier WEP.
3. Turn of your router or modem.?