phuture.wordpress.com
Cisco PIX | Information Security Consulting
https://phuture.wordpress.com/2006/01/13/cisco-pix
Information Security Rants and Raves. Cisco PIX Security applications can enforce policies on users and applications. Cisco PIX can protect you from many different network and Internet based attacks. Cisco PIX offers secure connectivity, using methods such as SSHv2 Secure Shell. Two and VPN virtual private networks. This is fairly easy to setup. Cisco PIX can provide you with secure VOIP voice over internet protocol. IPSec or Internet Protocol Security. IPSec can be setup for VPN’s. Everything can be man...
phuture.wordpress.com
Cisco PIX | Information Security Consulting
https://phuture.wordpress.com/2006/01/13/cisco-pix-2
Information Security Rants and Raves. Cisco PIX Security applications can enforce policies on users and applications. Cisco PIX can protect you from many different network and Internet based attacks. Cisco PIX offers secure connectivity, using methods such as SSHv2 Secure Shell. Two and VPN virtual private networks. This is fairly easy to setup. Cisco PIX can provide you with secure VOIP voice over internet protocol. IPSec or Internet Protocol Security. IPSec can be setup for VPN’s. Everything can be man...
phuture.wordpress.com
How many blogs | Information Security Consulting
https://phuture.wordpress.com/2007/09/19/how-many-blogs
Information Security Rants and Raves. I have two Blog’s going right now. This one and www.computersecurityadvice.com. Laquo; Information Security Consultant. Date : September 19, 2007. Wow, in relation, my brother just bought a puppy for my nephews, who decided that it should be called Trixie Too because it looked just like my dog Trixie that my parents just had to put down. They did get over-ruled and I believe the new little scrapper will be called .Princess! Leave a Reply Cancel reply.
phuture.wordpress.com
PERL | Information Security Consulting
https://phuture.wordpress.com/2006/01/13/perl
Information Security Rants and Raves. Practical extraction and reporting language. Perl is a stable programming language. It is great for automating tasks, especially system administration chores. It is Open Source which means its free. PERL was created by Larry Wall. PERL is sometimes called the duct-tape of the internet. PERL can be used with popular database programs and implemented into websites as well. Where can you get PERL? Http:/ www.perl.org/get.html. The PERL Journal http:/ www.tpj.com/.
phuture.wordpress.com
Information Security Consultant | Information Security Consulting
https://phuture.wordpress.com/2007/06/13/information-security-consultant
Information Security Rants and Raves. I have decided that I want to do IT security for a living. I think it is the right path to take. I love reading about vulnerabilities and trying to figure out exploits. I’m starting to understand the concepts that different attackers use such as session hijacking, escalation, SQL injection techniques, Cross Site Scripting, race conditions, shell code etc…. Languages I like and want to learn PERL, PHP, C, Assembler, Python, and Ruby. I read Dr. Dobbs currently. Fill i...
phuture.wordpress.com
Information Security Consulting | Information Security Rants and Raves | Page 2
https://phuture.wordpress.com/page/2
Information Security Rants and Raves. I hear allot about VOIP. VOIP stands for voice over internet protocol. Basically it means making phones calls over your local area network (LAN) or even across the Internet. VOIP is normally cheaper than your PSTN that’s public switched telephone network i.e. your local carrier. VOIP routers can send your incoming phone calls to you anywhere thus cutting down on the number of lines and you can be reached anywhere you have a Internet connection. The firewall does audi...
phuture.wordpress.com
More info on Cisco PIX 501 | Information Security Consulting
https://phuture.wordpress.com/2006/01/13/more-info-on-cisco-pix-501
Information Security Rants and Raves. More info on Cisco PIX 501. Cisco Firewall PIX 501. This firewall is designed for homes and small businesses.This firewall can support up to ten users on a basic license from Cisco. It has a 133 MHz processor and comes with 16MB’s of RAM. In addition it has 8MB of Flash RAM. The PIX 501 allows you to setup a VPN-Virtual Private Network easily with the Cisco Easy VPN Server. The firewall supports speeds up to 60Mbps bidirectional. Laquo; Voice over IP.
phuture.wordpress.com
Building Internet Firewalls | Information Security Consulting
https://phuture.wordpress.com/2006/01/13/builfing-internet-firewalls
Information Security Rants and Raves. Building Internet Firewalls by Oreilly. This book covers the basics of firewall technology to the nitty gritty details. I highly recommend it. It is well written and covers such interesting topics as protocols, databases, security strategies and examles of firewall setups. It goes over Internet Services such as RPC, DCOM, DOM, CIFS, SMB, SSL, RAS, PPTP and so many others. This book is a awesome reference to add to your security analyst book collection. Came across a ...