Category Archives: Network Security

Fix Certificate Error: navigation blocked in IE

Certificate error and the navigation being blocked in internet explorer is one of the common heriditary disease which Microsoft fails to check each time a new version is rolled out. This certificate error was visible from internet explorer version 7 to ie9. This trademark behavior of the Microsoft has compelled the users to shift to other browsers which always keeps clearing out the old bugs in their new versions.
Continue reading

Little Snitch – Download and Alternatives for Windows

Little Snitch is a well known Mac OS X firewall utility which monitors applications, preventing or permitting them to connect to the Images Of Little Snitchnet via advanced rules. When you are connected to the internet, the apps are capable of exchanging information according to its needs. Sometimes the application will seek user permission to allow information exchange whereas on other occasions it might go ahead without prompting for permission. Here is where Little Snitch comes in handy. If an application tries to establish an outgoing internet connection, Little Snitch prevents the application from establishing that connection. Continue reading

Cisco NAC Agent

What is Cisco NAC Agent?

Cisco NAC agent (commonly known as Clean Access Agent), is a client side authentication technique implemented by Cisco systems which can also check for required program updates and patch files if necessary.

It is very surprising to see that this process can be hacked easily but is still being implemented in many large institutions for authentication and validation. The worse part is that, it can handle Windows OS effectively but lacks the ability to validate Mac OS or LINUX systems. Though it provides a web based authentication procedure for these OS, it can easily be over ridden to bypass major authentication protocols. Continue reading

Secret Guide to Wireless Hacking (Tools included)

With the advent of wireless technology, we stand amongst many open  connections or wireless network which lure us to use them and under most cases escape unhurt but sometimes, we get trapped as well. If you are not aware of the risks of using an open end wireless connection let us start with some basic facts related to wireless hacking.

Continue reading

4 misconceptions about wireless network security

Your homework before you start reading this article is to search ‘how to protect your wireless security’ or anything related to that term and see what you get. You will find that you get the same tips over and over again. For example, some articles will suggest you to stop broadcasting your SSID (Service set identifier), some articles will suggest you to use MAC Address filtering. This article will help you clear up some misconceptions behind these wireless network security tips. Sure, they will cover your bases against basic wifi piggybackers but it will not stop the more advanced users from stealing your network bandwidth.

1. Do not broadcast your SSID

Your SSID, or service set identifier is a unique name for your network. For example, you can rename your SSID so it become Sam’s Wireless Network or S@MN3twork. One common tip which people give is to hide your SSID. However, this now provides zero security and privacy. There are many programs known as wireless packet sniffers out there which can reveal your SSID without much hassle. Also note that hiding your SSID is not part of the wireless specification so you may encounter technical errors by trying to hide it.

2. Enable a WEP password

The next mistakes many websites ask you to do is to encrypt your wireless network with a WEP password. This comes with a big no. Why? WEP encyrptions is flawed in many ways. There is a reason why they developed new encryptions such as WPA2 and with AES. With WPA2, you will need a minimum 20 character password which makes it even more difficult for hackers to crack.

3. Reduce the transmitting power of your router

This myth is clearly another mistake which jumps around the internet bandwagon. The problem with this tip is that there are now many wireless packet receivers available which can catch wireless network signals from very long distances.

4. Use MAC Address Filtering

Just like the SSID, Mac Address Filtering can easily be defeated with wireless packet sniffers or by using a technique called MAC Address spoofing. Your Mac Address is a unique identity for any device connected to your network. For example, your laptop would have its own unique MAC address and so would your iPhone. MAC Address filtering may also take some significant effort if you have multiple computers.