Information Security Resources

Entries for the ‘Network Security’ Category

Cyber Wars: USA vs. China

This is a guest post from Jay McGraw, a blogger for Illinois Internet Providers that is worth a read. What do you think? Cyber Wars: USA vs. China Just a short time before delivering his first State of the Union address of his second term, President Barack Obama signed an Executive Order that directly addresses the 21st century [...]

Leave a Comment

Network Security: Firewalls

What is the purpose of a Firewall? Firewalls are absolutely vital for keeping network security in force. The firewall stops and controls the traffic that comes between your network and the different sites you go to. A firewall is a constituent of a company’s network protection, and it acts to keep in force the network [...]

Leave a Comment

Why Firewall Security Is Necessary To Protect Your Network

In your car, the firewall sits between the engine compartment and the front seat and is built to keep you from being burned by the heat of the combustion process. Your computer has a firewall, too, for much the same reason – to keep you and your data from being burned by hackers and thieves [...]

Leave a Comment

Transmission Control Protocol (Tcp)

Transmission Control Protocol (TCP)  Today, the majority of application protocols use the Internet’s reliable Transmission Control Protocol (TCP). The functionality of TCP  is designed to be adequate not only for Internet applications but also for the variety of underlying networks.            The protocol aims at providing a reliable service with the following features:        1. Fairness [...]

Leave a Comment

How to Generate a Digital Certificate for S/MIME (Secure MIME) email Communication

For most S/MIME compatible email clients, you must obtain a PKCS12 format certificate before you can upload your private key and/or others’ public key for secure email communication. The first way you can do this is, of course, to apply such a certificate from a trusted Certificate Authority (CA), such as VeriSign. But can you [...]

Leave a Comment

Public Key Infrastructure: Using Self Generated Public and Private Key Pairs to communicate Without PKI

Can we use self generated Public and Private Keys to communicate without Public Key Infrastructure? Originally, you can use PGP (Pretty Good Privacy) freeware to communicate freely. PGP freeware can be downloaded here: However, since they have recently taken down the freeware for the Windows platform, I’ll show you how to use another piece [...]

Leave a Comment

Security Issue with Google Browser Chrome: How to Handle

I read a piece of news about the security issue of the new Google Browser Chrome from ComputerWorld. The Google Browser is an open source project, and many of the components it was built on use open source software. One of them is the open-source rendering software called WebKit. This component was found to have [...]

Comments (1)

Using Fport to Check for Trojan Horses

This article will tell you about a simple way to check whether your computer system has a trojan horse (spyware) implemented. A trojan horse or spyware operates by running on your computer and opening a communication port (TCP port) to communicate with the remote hacker, so he or she can “spy” on your computer. The [...]

Leave a Comment

Public Key Infrastructure: Certificate Authority and Its Role in PKI: An Example

Public Key Infrastructure is also named PKI. What is the role of Certificate Authority in PKI? Before we talk on this, let’s discuss the term “trust”. The operation of Public Key Infrastructure strongly depends on “trust”.  And this is also related to the application of asymmetric cryptography technique. To illustrate this, let’s suppose Bob wants [...]

Leave a Comment

Anti Spam Filtering Using Gmail

Anti Spam Filtering using Gmail? Why? I have been using Gmail, Yahoo! Mail, and Hotmail for very long time. My general feeling is that the super-powerful anti spam filtering capability of Gmail is unprecedented. It can eliminate almost 98% of spam emails while at the same time maintaining an almost zero error rate of filtering [...]

Leave a Comment