Posts Tagged ‘Internet’

Bypassing Firewalls Using ICMP-Tunnel

On the computer network a person feels himself not comfortable with all those security measures implemented (firewalls, proxy servers, Router Access lists…), these measures are very important to protect users but even if all these perimeters are installed we can have a good opportunity to eliminate and bypass them. Usually there are some standard protocol [...]

Share

London Stock Exchange Suffered a System Failure Again

On Thursday at 9:32 London Stock Exchange (LSE) one of the largest stock exchanges in the world has experienced a failure for more than three hours. This failure has resulted a lost of more than 5 percentage points to 62.85 percent of FTSE 100 stocks. The problem gave investors a negative impression of the current [...]

Share

Http over SMTP Proxy

In some cases you find your self in need of a way to navigate the website and you have no internet connection. Hosproxy is a tool designed to let you access the web in a LAN without internet connection but with access to an E-mail system only. This tool consists of two parts: • HosTunnel: [...]

Share

Visitors from Bing.com

Yesterday while I was looking at the Blog state I have noticed that some visitors were coming from a certain site called Bing.com. I started to search about it, after some search using Google I found some adds on the net talking about the new Microsoft search engine Bing. The name seemed to me nice [...]

Share

Gartner Says Consumers Are Unwilling to Sacrifice Convenience for Security, Despite Widespread Online Fraud

Two-Thirds of U.S. Consumers Surveyed Use the Same One or Two Passwords for All Web Sites Although consumers claim to be concerned about security, they have little tolerance for sacrificing convenience to safeguard that security, according to Gartner Inc. Despite widespread security concerns, consumers continue to rely on service providers to protect their safety and [...]

Share

DNS Poisoning

security researcher Dan Kaminsky who works at security services firm IOActive, said this week at BlackHat that the time may have come for IT vendors and users to consider broad adoption of the more-permanent security protections offered by DNS Security Extensions, or DNSSEC, technology. The cache-poisoning flaw was publicly disclosed last July and after several [...]

Share

Computing in the Cloud Models- Right Now

In the last months there has been a rapid increase in investment in the Cloud Computing and related areas. This growth is due to the demand for virtual “cloud” resources, the Idea of Cloud Computing is near another approach called utility computing, where computing resources are treated as a service and takes into account the [...]

Share