The Latest Security Software

Security Software Discussion

Find the Best Security Software from 2020 here:


Netcraft Toolbar

Google Safe Browsing Extension for Firefox & Netcraft Toolbar – Anti-Phishing

I remember some time back Netcraft developed an anti-phishing toolbar for Internet Explorer Exploder and Firefox. You can check it out here: Netcraft Toolbar Protect your savings from Phishing attacks. See the hosting location and Risk Rating of every site you visit. Help defend the Internet community from fraudsters. Then recently Google has come out […]

Topic: Phishing, Security Software

US Investigates Snort Sale as a Security Risk

Basically the Americans are saying a lot of their sensitive govermental organisations are using Snort and they don’t want the software to be controlled by an Israeli company, they see it as a threat. The same Bush administration review panel that approved a ports deal involving the United Arab Emirates has notified a leading Israeli […]

Topic: Legal Issues, Security Software

SSL VPNs and OpenVPN – Part IV

4. Brief How-to …. Creating Multiple clients to Single site tunnels. Example of using PKI to create a client-to-site VPN: For a road warrior or roaming/multiple user scenario, static keys based VPNs don’t scale well. You will need to implement a PKI if you have Hub and Spoke architecture of VPN. From the OpenVPN.net website: […]

Topic: Linux Hacking, Networking Hacking, Security Software

SSL VPNs and OpenVPN – Part III

3. Brief How-to ….. OpenVPN and Site-to-Site Tunnels. OpenVPN can be implemented either Site-to-site or client-server model. I will take example configurations of both models. If you want to implement site-to-site configuration, the best way is to use static-keys instead of PKI. Using static keys, you can have your VPN tunnel up and running in […]

Topic: Linux Hacking, Networking Hacking, Security Software

SSL VPNs and OpenVPN – Part II

2. Why OpenVPN Here, in this article, I will lay down the emphasis on one important Open-Source SSL VPN software written by James Yonan and contributed by several others, which proposes security without the inherent complexity of IPsec AND using a trusted design of client component and VPN server. Usually VPNs require end points which […]

Topic: Linux Hacking, Networking Hacking, Security Software