WLAN security: how to make your wireless network into a fortress

When you’re travelling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data using one of these access points. In the following article, we explain the biggest security risks and show you how to make [...]   

Debian: what does this Linux kernel offer?

Anyone looking to learn about Linux operating systems will come across Debian soon enough. The GNU/Linux distribution was one of the first of its kind and is still one of the most widely used today. Over 1,000 community members work on the Debian project, furthering the development of the collection. But how did Debian become so successful? And what makes this system software so interesting to [...]   

IP Spoofing: Simple manipulation of data packets by attackers

Sending data over networks is one of the most important and highest utilised functions of the modern computer era. But the structure of the necessary TCP/IP connections makes it all too easy for criminals to intercept data packets along their way and either view or alter their contents. One of the most common methods of attack is IP spoofing, which allows DoS and DDoS attacks, among other things [...]   

Network protocol: The basis of electronic data exchange

For computer systems to be able to communicate with each other and exchange information, they need common ground, just like humans must share a common language. But computers don’t rely on foreign language lessons, and instead only need the appropriate network protocol to successfully communicate. This provides guidelines and structures for the data transfer, and so plays a decisive role in the [...]   

Penetration test: how to find weak points in your network

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems. Large companies, in particular, prefer to use penetration testing to check how well their security concept works. This [...]   

NAT: Network Address Translation in the router

NAT, the network address translation, is closely tied to the internet standard IPv4 and will disappear from the internet along with it. But the implementation of IPv6 is slow to take over, and many internet users worldwide still surf with the fourth version of the internet protocol. As a result, network address translation via NAT tables remains current. In our guide, we answer the questions: What [...]   

What is Internet Protocol? Definition and basics.

When networking a computer system, protocols play an important role. An example is the Internet protocol, which was published in a first specification in 1981, and is the indispensable basis for the smooth sending and receiving of data packets. But what is behind the RFC standard? And how does the Internet protocol actually work?   

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept, [...]   

What is MAC spoofing?

MAC spoofing is a method by which unique hardware addresses are masked using a Locally Administered Address (LAA) in the software. MAC spoofing can offer protection for your privacy when using public LAN or WLAN networks, but can also be used for illegal network activities. We explain to you here how MAC spoofing works and which settings in Windows must be accessed in order to change your MAC [...]