Attacks+network

Showing results 1 to 20 of 100

Colasoft Packet Builder

Colasoft Packet Builder is useful tool used for creating custom network packets, you can use this tool to check your network protection...

March 31, 2010 By Colasoft

TracksTracker Lite

TracksTracer Lite allows network administrators to quickly and easily identify attacks against Microsoft IIS Web Servers. This tool...

March 14, 2007 By TrueProtection Software

Hide My Ass throws light on 'LulzSec' logs

British virtual private network company Hide My Ass has said that it turned over logs on a suspected LulzSec member to the FBI in response to a UK court order.The court order requested information related to an account associated with a number of attacks on computer systems, Hide My Ass said in a blog post on Friday.

September 27, 2011 by

LulzSec: Is it too cocky for its own good?

With a 19-year-old behind bars following network intrusions and denial of service attacks against "a number of international business and intelligence agencies," the fate of LulzSec remains an open question.

June 20, 2011 by

Melbourne IT shares show virtue: Turnbull

Shadow Communications Minister Malcolm Turnbull has said that he's just being honest when he attacks the $43 billion National Broadband Network (NBN) project, despite holding shares in a company that stands to benefit from the NBN.

November 21, 2010 by

Blended network attacks evade defences, says firm

Attacks that blend techniques to evade detection are slipping past network defences, according to security company Stonesoft.Individual evasion techniques such as packet fragmentation and IP header spoofing are currently detected by network defence tools, Stonesoft chief executive Ilkka Hiidenheimo told ZDNet UK on Monday.

October 19, 2010 by

Vocus takes action against DDoS

Arbor Networks announced this morning that network provider Vocus has selected its Peakflow platform to protect its network against distributed denial-of-service (DDoS) attacks.

August 31, 2010 by

Network security and fun with routing

I've been reviewing the use of DHCP as an attack vector -and what I found is the usual thing: most of the attacks follow highly traditional paths with a ten year history of increasingly clever solutions to increasingly clever variations on the same themes. Great, except that it seems to me there's an easy and virtual foolproof way of using DCHP with NAT to blow holes in just about anybody's network "security."

February 19, 2010 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories