background preloader

HTG Explains: The Difference Between WEP, WPA, and WPA2 Wireless Encryption (and Why It Matters)

HTG Explains: The Difference Between WEP, WPA, and WPA2 Wireless Encryption (and Why It Matters)
Even if you know you need to secure your Wi-Fi network (and have already done so), you probably find all the encryption acronyms a little bit puzzling. Read on as we highlight the differences between encryption standards like WEP, WPA, and WPA2–and why it matters which acronym you slap on your home Wi-Fi network. What Does It Matter? You did what you were told to do, you logged into your router after you purchased it and plugged it in for the first time, and set a password. What does it matter what the little acronym next to the security encryption standard you chose was? As it turns out, it matters a whole lot: as is the case with all encryption standards, increasing computer power and exposed vulnerabilities have rendered older standards at risk. WEP, WPA, and WPA2: Wi-Fi Security Through the Ages Since the late 1990s, Wi-Fi security algorithms have undergone multiple upgrades with outright depreciation of older algorithms and significant revision to newer algorithms.

6 free network vulnerability scanners Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself. Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process. + ALSO ON NETWORK WORLD 8 free Wi-Fi security tools + Though vulnerability scanners and security auditing tools can cost a fortune, there are free options as well. 1. The Open Vulnerability Assessment System (OpenVAS) is a free network security scanner platform, with most components licensed under the GNU General Public License (GNU GPL). The OpenVAS Manager controls the scanner and provides the intelligence. 2. 3. 4.

The Ultimate List of Free Content Creation Tools & Resources Creating content isn't always a walk in the park. (In fact, it can sometimes feel more like a sprint in a swamp.) While other parts of business and marketing are becoming increasingly automated, content creation is still a very manual job. Automation hasn't yet replaced what we do (thank goodness). That being said, there are plenty of tools out there to make creating content much easier. Click here to download our full collection of content creation templates for blog posts, ebooks, infographics, and more. Below, you'll find a list of 28 fantastic tools and resources to help you research, write, edit, and design content more easily. Let's get started. 28 Free Tools & Resources to Make Content Creation Easier For Researchers 1) Google Drive Research Tool Google recently added a tool to Drive that allows you to conduct Google searches without ever leaving your Drive window. 2) Site:search This is a handy Google hack I use every day. 3) Google Webmaster Tools Doing SEO and keyword research?

InfoSec Handlers Diary Blog - Hashing Passwords After talking about SQL Injection, this is the second part of the mini series to help you protect yourself from simple persistent attacks as we have seen them in the last couple months. A common MO employed in these attacks is to steal passwords from a database via sql injection. Later, the attacker will try to use these passwords to break into other sites for which users may choose the same password. Of course, part of the problem is password reuse. First of all: What is hashing? Storing a password as a hash will make it difficult to figure out the actual password a user used. A hash isn't fool proof. Probably the most important defense against rainbow tables is the idea of introducing a "salt". In order to use a "salt", the salt value and the users password are first concatenated, then the string is hashed. Another trick to harden a hash is to just apply the same algorithm multiple times. Here a proposal to create difficult to reverse hashes with salt: ------ Johannes B.

Wi-Fi Protected Setup Flaws Make Wireless Network Brute-force Attacks Feasible Design flaws in the Wi-Fi Protected Setup (WPS) wireless standard can make it easier for attackers to obtain access codes for secured wireless networks by brute force. The vulnerabilities identified by security researcher Stefan Viehbock affect a large number of WPS-enabled routers and wireless access points. The WPS standard was created in 2007 by the Wi-Fi Alliance in order to provide non-technical users with a simple method of setting up wireless networks. The standard supports several Wi-Fi authentication methods including one that requires pushing a physical button on the router and one that uses a predefined PIN number printed on a sticker by the device manufacturer. The PIN-based method is mandatory for WPS-certified devices, which support it by default. The WPS PIN is an eight-digit random number. The main problem lies with how devices respond to failed WPS authentication attempts. The U.S.

The Top 5 Social Media Management Tools for Small Business Managing your company’s social media presence is becoming an increasingly complex task. Small-business owners who used to rely on Twitter to post updates to LinkedIn, for instance, no longer have that option. Fortunately, other tools allow you to manage your business’s assorted social media accounts from a single dashboard. We've selected the top five that are specifically geared toward small business. Affordability: The tool is either free or priced low enough to meet the budget of a one- or two-person business.Scalability: The tool grows with your company's needs, even if you start with just one or two accounts.Support for Facebook, LinkedIn, and Twitter: If a social media management tool doesn’t post to all three networks, it’s dead to most small businesses.Update posting assistance: The tool allows you to schedule posts in advance. HootSuite Cost: HootSuite is free for one user and up to five social profiles. VerticalResponse Cost: VerticalResponse Social is $18 per month.

Storing Passwords - done right! Written by: Christoph Wille Translated by: Bernhard Spuida First published: 1/5/2004 Viewed 257725 times. 1766 ratings, avg. grade 4.76 In very many - not to say almost all - Web applications user data is administered, from Web forum to Web shop. These user data encompass login information of the users which contain the password besides the user name - and this in plain text. A security leak par excellence. Why is storing the user name and password in plain text a security leak? Well, imagine a cracker gaining system access through eventual OS or server software errors, and being able to read the user database. How can this security risk be eliminated? What is a Salted Hash? A hash is a numerical value of fixed length which unequivocally identifies files of arbitrary legth. The reason for this is that usually so called 'Dictionary Attacks' are run against hashed passwords - a good example being the MD5 hashed passwords of NT4. Storing the Salted Hash Generating Passwords - done right!

4 Keys To A Data Security Strategy Organizations must prepare for the inevitable security breach and focus on protecting sensitive corporate data. Here are some ideas to build on. If you’re an IT pro, protecting your company’s security may have recently become part of your job description. This probably didn’t come as a surprise -- more than 40% of companies suffered a breach last year, according to the Ponemon Institute. While you need to continue to focus on keeping out the bad guys, organizations need to acknowledge the reality that it’s not always possible and develop a plan B when the fail-safe fails. 1. At the highest level, companies are finally starting to get away from the head-in-the-sand approach to data security. Whether internal team members play a purposeful role in the attack or become inadvertently involved as the result of human error, an internal network source usually provides hackers with access to valuable information. 2. Human error is going to happen, and breaches will continue to be prevalent. 3.

Palco MP3 - maior site de música independente do Brasil Free Rainbow Tables » Distributed Rainbow Table Generation » LM, NTLM, MD5, SHA1, HALFLMCHALL, MSCACHE IPv6: The security risks to business Predictions about when the world will end are about as consistent as the predictions about when IPv4 internet addresses will finally run out, but some IT security professionals say that is really the least of our worries. A much bigger concern, they say, should be the security holes that will open up in many business organisations as the world moves over to internet protocol version six (IPv6). This is an important aspect of the changeover that has been lost in all the hype around how IPv4 is about to run out of IP addresses assigned to each internet-connected device because of the explosion of internet users, devices and web services. IPv6 will solve this problem because it provides over four billion times more addresses than IPv4, but in solving that problem, it could expose businesses to cyber attacks as hackers use IPv6 to bypass security controls and filters designed and configured for IPv4 traffic. IPv6 attacks likely to increase with adoption Security advantages of IPv6 Email Alerts

Related: