RECENT POSTS BELOW

Trending: Mobile Daddy

Visit TechMyriad

Saturday

HOW HACKERS HACK YOUR NETWORK-2

HOW HACKERS HACK YOUR NETWORK


When you see the scanning activity in your firewall logs, you'll know where you're being scanned from and what they're trying to target. Armed with that data your security person should check to see if you're running software that uses that port and if it has any newly discovered openings.

If you are using software listening on a scanned port and there is a patch available, you should have that patch applied immediately - because the hackers may know something you don't. It's been our experience that many businesses patch their Microsoft Windows software but rarely do they check for patches for all the other software used in the business.

As stated, you'll see this activity in your firewall logs - that is, if someone is actually reviewing your firewall logs.

Oh, my firewall has logs???

However, when most business owners are asked about their firewall logs, the typical response is usually something like, "Oh, my firewall has logs?"

Yes, all firewalls produce log files. Most of them only show what's been blocked, which is like showing pictures of all the thieves that are in prison, while the bank down the street is being robbed.

Wouldn't you want to see all traffic? This produces more work, but if your firewall only logs activity it knows about, you're security is totally dependent on the ability of your firewall and the way it's configured.



GO TO PAGE - 1>2>3>4

0 Responses to “HOW HACKERS HACK YOUR NETWORK-2”

Post a Comment

Next previous home

Sponsors

DeskAway Project Management
All Rights Reserved HACKING HUB
SOFTONDO
Back to TOP