On this website I have written tens of articles about enterprise level firewalls (especially Cisco ASA) but many people are interested to learn about the best hardware firewalls for home or small business networks, so this is what I’ll focus in this article. Firewalls are designed to monitor incoming and outgoing traffic, helping to keep […]
12 Best Open Source Firewalls Comparable to Commercial Solutions
Usually, in the world of network security, when we talk about Firewalls we mean the devices that help protect your computer systems and networks from attacks and provide a “wall” in front of servers and IT resources. The above concept of a “Firewall” refers to the classic network hardware firewall such as the Cisco ASA, […]
Network based Firewall vs Host based Firewall-Discussion and Comparison
A “Firewall” is one of the most popular computer and network security devices that professionals use to protect their enterprise IT assets and networks. Just like a fire-resistant door in buildings which protects rooms from a possible fire and stops the spreading of flames within the building, the security firewall has a similar function to […]
Comparison and Differences Between IPS vs IDS vs Firewall vs WAF
There are so many acronyms in the networking and security field that can drive you crazy. The terms IPS, IDS, WAF etc might be known acronyms in the field of network security but many beginner professionals sometimes have difficulty to understand the concept behind these technologies, how they compare etc. In this article I’ll do […]
What Are the Biggest Cybersecurity Threats in 2021? (And How Can You Deal With Them?)
The Internet Crime Complaint Center (IC3) of the FBI has reported that the cost of cybercrimes doubled last year to a whopping $2.7 billion. What’s more? The IC3 reported that most of the complaints included personal data breaches, extortion, non-payment/non-delivery scams, and romance or confidence fraud. What does that mean for your business? With cybersecurity […]
What is a Network Security Key in Home Wireless Networks?
It is fair to say that there are few things more important to your daily security than the security of your Internet connection and hence your privacy and sensitive data. Everyone has heard horror stories of their information being stolen via covert means online, and nobody wants to be subject to the nightmares that can […]
7 Types of Firewalls in I.T and Computer Networks Explained
The firewall is the cornerstone of security in computer networks and I.T in general. In this website I have been talking extensively about the Cisco ASA firewall which is a classic example of a hardware network firewall. However, there are some other types of firewalls used in large enterprises, SMB or even home networks. Some […]
Scanning and Fixing the BlueKeep (CVE-2019-0708) RDP Vulnerability
Whenever Microsoft releases security patches even for unsupported Operating Systems (such as Windows XP, Vista etc) then you must act immediately (as a company or administrator) because it’s always a serious issue. This is what happened in May 14 when Microsoft released security patches for a critical software vulnerability affecting the Remote Desktop Protocol (RDP). […]
NMAP Commands Cheat Sheet and Tutorial with Examples (Download PDF)
NMAP (Network Mapper) is the de facto open source network scanner used by almost all security professionals to enumerate open ports and find live hosts in a network (and much more really). One of my responsibilities in my job is to perform white hat penetration testing and security assessments in corporate systems to evaluate their […]
What is QUIC – This new Google Protocol makes Firewalls Blind
QUIC (Quick UDP Internet Connections) is a new generation Internet protocol that speeds online web applications that are susceptible to delay, such as searching, video streaming etc., by reducing the round-trip time (RTT) needed to connect to a server. By replacing TCP with UDP and encrypting most of its payload, QUIC reduces the time it […]
How I Use NMAP in Penetration Testing Engagements
As a network security engineer, among tens of other tasks, I run also security assessment and penetration testing projects. One of the most popular and widely used network scanning tool is NMAP. This is one of the tools that I use at the beginning of a penetration testing engagement and helps tremendously in identifying targets, […]
KRACK WiFi Vulnerability – WPA2 has been breached
On October 16, 2017 a serious security vulnerability has been published by researchers from KU Leuven, a university in Belgium. This has to do with WPA2 protection in WiFi networks, which is the modern security standard considered to be very safe so far. This vulnerability has to do with the WPA2 technology itself and is […]
How to Scan your Network for MS17-010 SMB Eternalblue Vulnerability
Last week the whole world, and especially the information security community, has been buzzing around the massive ransomware attacks that infected thousands of computers in hundreds of countries. But how did all started? Many of you know the story, but let’s summarize it once again: NSA had developed some secret exploits that took advantage of […]