Search This Blog

Sunday 29 January 2012

linux installation


What you will need:

  1. Turnkey Linux PDC Appliance .ISO file
  2. Software to burn the .ISO such as ImgBurn (Freeware)
  3. Either an empty, bare metal, physical server with networking or
  4. Virtual machine (VM) application such as Virtualbox / VMWare etc

Installation:
For this guide we will be using VMWare but the installation is the same for a
physical server.
OK let's go:

  1. Power up the server and insert the .ISO CD (make sure your server is
  2. configured to boot from CD / DVD)
  3. You will now be presented with the following screen:
  4. Please choose Install to hard disk
  5. Setup will proceed
  6. You will now be prompted on what you want to do with the disk partition
  7. To use the full disk select: Guided - use entire disk
You will then receive a warning about destroying ALL data on the disk, if
that's OK then select Yes
artitions will now be formatted and installation will continue
Security:
You will now be prompted to enter a password for the Root
Choose a sensible, secure password and remember it
Retype the password
Domain / Samba Setup:
You will now be presented with the option to name your Samba domain
For this example we will leave the default of Domain as shown:
Now enter a password for the Samba administrator account as shown:
Retype the Samba administrator account password:
Installation should now be complete - You will now be prompted to
restart as shown:

Wednesday 25 January 2012

Wireless Networking Standards


Use this wireless networking standards chart to get quick information to help you differentiate between the available wireless networking standards and choose which standard might be the right fit for your business. See the links below the chart for further information on wireless networking standards.



Standard



Data Rate



Modulation Scheme



Security



Pros/Cons & More Info

IEEE802.11
Up to 2Mbps in the 2.4GHz band
FHSS or DSSS
WEP & WPA
This specification has been extended into 802.11b.

IEEE802.11a
(Wi-Fi)
Up to 54Mbps in the 5GHz band
OFDM
WEP & WPA
Products that adhere to this standard are considered "Wi-Fi Certified." Eight available channels. Less potential forRF interference than 802.11b and 802.11g. Better than 802.11b at supporting multimedia voice, video and large-image applications in densely populated user environments. Relatively shorter range than 802.11b. Not interoperable with 802.11b.

IEEE802.11b
(Wi-Fi)
Up to 11Mbps in the 2.4GHz band
DSSS with CCK
WEP & WPA
Products that adhere to this standard are considered "Wi-Fi Certified." Not interoperable with 802.11a. Requires fewer access points than 802.11a for coverage of large areas. Offers high-speed access to data at up to 300 feet from base station. 14 channels available in the 2.4GHz band (only 11 of which can be used in the U.S. due to FCCregulations) with only three non-overlapping channels.

IEEE802.11g
(Wi-Fi)
Up to 54Mbps in the 2.4GHz band
OFDM above 20Mbps, DSSSwith CCK below 20Mbps
WEP & WPA
Products that adhere to this standard are considered "Wi-Fi Certified." May replace 802.11b. Improved security enhancements over 802.11. Compatible with 802.11b. 14 channels available in the 2.4GHz band (only 11 of which can be used in the U.S. due to FCC regulations) with only three non-overlapping channels.

IEEE
802.16
(WiMAX)
Specifies WiMAX in the 10 to 66 GHz range
OFDM
DES3 and AES
Commonly referred to as WiMAX or less commonly as WirelessMAN or the Air Interface Standard, IEEE 802.16 is a specification for fixed broadband wireless metropolitan access networks (MANs)

IEEE
802.16a
(WiMAX)
Added support for the 2 to 11 GHz range.
OFDM
DES3 and AES
Commonly referred to as WiMAX or less commonly as WirelessMAN or the Air Interface Standard, IEEE 802.16 is a specification for fixed broadband wireless metropolitan access networks (MANs)
Bluetooth
Up to 2Mbps in the 2.45GHz band
FHSS
PPTP, SSL orVPN
No native support for IP, so it does not support TCP/IP and wireless LAN applications well. Not originally created to support wireless LANs. Best suited for connecting PDAs, cell phones and PCs in short intervals.
HomeRF
Up to 10Mbps in the 2.4GHZ band
FHSS
Independent network IP addresses for each network. Data is sent with a 56-bit encryptionalgorithm.
Note: HomeRF is no longer being supported by any vendors or working groups. Intended for use in homes, not enterprises. Range is only 150 feet from base station. Relatively inexpensive to set up and maintain. Voice quality is always good because it continuously reserves a chunk of bandwidth for voice services. Responds well to interference because of frequency-hopping modulation.
HiperLAN/1(Europe)
Up to 20Mbps in the 5GHz band
CSMA/CA
Per-session encryption and individual authentication.
Only in Europe. HiperLAN is totally ad-hoc, requiring no configuration and no central controller. Doesn't provide real isochronous services. Relatively expensive to operate and maintain. No guarantee of bandwidth.
HiperLAN/2(Europe)
Up to 54Mbps in the 5GHz band
OFDM
Strong security features with support for individual authentication and per-session encryption keys.
Only in Europe. Designed to carry ATM cells, IP packets,Firewire packets (IEEE 1394) and digital voice (from cellular phones). Better quality of service than HiperLAN/1 and guarantees bandwidth.
OpenAir
Pre-802.11 protocol, using Frequency Hopping and 0.8 and 1.6 Mb/s bit rate
CSMA/CA with MAC retransmissions
OpenAir doesn't implement any encryption at the MAC layer, but generates Network ID based on a password (Security ID)
OpenAir is the proprietary protocol from Proxim. All OpenAir products are based on Proxim's module.
For more information on wireless networking standards, visit the following links:

How Do I Optimize My Wireless LAN (WLAN)?

These days it's hard to imagine life without wireless networks.  Wireless LANs make it possible to be more productive and accessible than ever before, and yet there are few things as frustrating as a sluggish wireless network that you just can't seem to get up to proper speed.  If you're running into wireless LAN connectivity or performance problems, we can help you diagnose the issues in order to ensure your WLAN operates at optimal speed.  Let's take a look at some of the most common issues that can degrade wireless network performance.

What appliances will secure my network?


What is a Network Appliance?

Often used by organizations to ease remote management and to cut costs, a network server appliance is a typically inexpensive personal computer (sometimes called a thin client) that enables Internet access and some business-related activities. Applications used on network appliances typically are housed on a Web server accessed by the appliance.
Network appliances lack many of the features of a fully equipped PC, and are often referred to as "closed box systems"  as they provide a complete solution consisting of limited hardware and software that is needed to perform a single or specialized set of functions. This hardware device allows for quick installation, ease-of-use, low maintenance and is typically managed through a Web browser. Increasingly, we're seeing appliances used in network security to replace more traditional software-based security solutions.
Popular with business and enterprise, Unified Threat Management (UTM) is a category of security appliances that integrates a range of security features into a single appliance. UTM appliances combine firewall, gateway anti-virus, and intrusion detection system (IDS) or intrusion prevention capabilities into a single platform. UTM is designed protect users from blended threats while reducing complexity. UTM appliances offer a way to manage multiple appliances from a single location, create and manage global security policies, provide real-time monitoring and logging, as well as provide a single interface to manage security. Its basically the evolution of traditional firewall and VPN (virtual private network) solutions that incorporates many additional products and services.
Network security appliances generally consist of a set of network management and security tools that are installed on-site. Many network security appliances will also provide organizations with secure VPN for remote access.

Terms to Know: Network Appliance Security Tools

(IPS) intrusion prevention system: An IPS, or intrusion prevention system is used in computer security. It provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic, but allows the administrator to provide the action upon being alerted. Some compare an IPS to a combination of IDS and an application layer firewall for protection.

(IDS) intrusion detection system: An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system.
(VPN) virtual private network: A network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
firewall: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
antivirus scanning: A utility that searches a hard disk for viruses and removes any that are found. Most antivirus include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.
content/spam filter: A pattern through which data is passed. Only data that matches the pattern is allowed to pass through the filter. In this case the filters would block based on a list of Web sites, blocking illegal, objectionable or non-business-related content.

DigiNotar


A Dutch Certificate Authority (CA) that issues SSL (Secure Sockets Layer) and EVSSL (Extended Validation) certificates, which help to ensure the websites visited by users when Web browsing are authentic rather than fake websites masquerading as legitimate sites. In July 2011, DigiNotar was hacked by acertificate bandit, which was able to issue fraudulent certificates through the company for a fake Google web site as well as several dozen other sites.
As a certificate authority, DigiNotar plays a critical role in data security and electronic commerce by providing an independent "trusted third-party" guarantee that the website and the person interacting and exchanging information with the website are really who they claim to be. Following DigiNotar's issuance of fraudulent certificates in 2011, Google, Mozilla and Microsoft all revoked the company's authority to vouch for its certificates as a trusted third party, and in September of 2011 the Dutch government announced that it would be switching to a different certification authority.

 
What are the security challenges of Cloud Computing?
How do I secure my wireless network?
How do I avoid getting spammed?
How do I secure my Windows PC?
DigiNotar
Do cookies compromise security?
What type of firewall do I need?
What are computer viruses?