Posts

Showing posts with the label network security

The Functions of NAT (Network Address Translation)

Image
Network Address Translation (NAT) is a technique to convert one IP address into another. This article explains the NAT and its functions in detail. We will also check the importance of Network Address Translation and how it helps in our daily life. Network Address Translation (NAT) allows you to convert one IP address into another. Let us check the primary functions of the Network Address Translation. Functions of Network Address Translation NAT helps to share a single Internet connection among multiple devices in a network. NAT acts as a barrier between external elements and our internal network. How NAT Helps a Regular Person? Now let us check how NAT helps a regular person in daily life. Assume you have two laptops, two smartphones, and a desktop computer in your home. You have a Cox Internet connection and a Belkin wireless router. The home network is simple. You connect the Belkin router to the Cox modem and all devices to the

Broadband Hack to Increase Your Internet Connection Speed

Image
Have you ever felt your Internet connection is slower than the speed promised by your ISP ? Well, you are not alone. One of the frequent support requests I received when I worked as an ISP Engineer was to help them to increase their Broadband speed. An end user cannot improve the ISP-allotted Internet bandwidth without their permission, but it is possible to increase Internet connection speed by simple broadband hacking. Speed and Bandwidth are different , and I believe you are familiar with the difference. Today, Team CoreNetworkZ explains some methods to improve your Internet connection speed. We can increase the download and upload speed without paying extra money to your Internet Service Provider (ISP) On your PC. We teach you methods like reducing the reserved bandwidth limit set by Windows and optimizing TCP/IP settings to improve the data connection speed on a PC. Increase The Upload and Download Speed On a PC Let us chec

View & Clear Saved Username and Passwords In Mozilla Firefox

Image
Have you forgotten your Instagram or Facebook password? Maybe you do not even have a password manager on your device, but there is a chance to recover forgotten passwords from the Firefox on your device. Yes, Firefox saves the username and passwords to sign into your online accounts in Gmail, Facebook, Instagram, etc. By default, Firefox prompts you to store the user credentials unless you select the button NO . Firefox Autofill feature asks you to remember the username and password by default. Look at the screenshot below to understand how your Firefox browser stores the username and password of your Instagram account while signing in. When you click the Save button, Firefox will save the login for Instagram. In the future, anyone with access to Firefox installed on your computer can view and edit the Instagram username and password. You will learn from this guide how to access and view the saved username and password from the Firefox browser. Find Save

Precautions For ROM-0 Router Vulnerability To Hack Access

Image
If you are still using older versions of Small Office Home Office devices for your home or office, it is the high time to consider updating them. A common vulnerability found on SOHO routers and Gateways (unfortunately even on the models which are still in the market) called ROM-0 vulnerability which lets an external intruder hack into your network router /gateway partially or even fully and gains control of it. If you have installed the lasted version of Avast on your computer, it features 'Home Network Security scanner' will tell you whether your Gateway is affected with ROM-0 vulnerability. This article is intended to inform you about one of the common network vulnerability which is utilized by hackers to gain access to the router, ROM-0, what is ROM-0 vulnerability and how to prevent your router from it. What is ROM-0 vulnerability ROM-0 vulnerability allows an attacker to request ROM-0 through HTTP port. Which means if the port 80 is open on your device, a hacker ca

Omiga Plus Browser Infection Removal Guide

Image
For the past week, my PCs have been suffering infection by an application named Omiga Plus. I have no idea how this application gets installed on my PC. It infected web browsers and changed their home page and default Search Engine. Omiga Plus has infected all browsers installed on my computer using the technique browser hijacking. Mozilla Firefox, Google Chrome, and Internet Explorer start showing Omiga Plus home page when I start. If I type a Search string on the default Search Engine, it is redirected to http://searches.omiga-plus.com/search/ where a lot of pop-ups and malicious ads are displayed. While checking their website, this software seems a cool product but it, in reality, it is nothing but a browser hijacking tool. This tutorial explains the steps to avoid the infection by this Potentially Unwanted Program and procedure to remove Omiga Plus forever. Check Whether Your PC Is Infected With Omiga Plus First of all, you have to check whether your laptop is infected with

Difference between DOS Attack and DDOS Attack

When I started my career as Network Engineer I was not much aware of the difference between DOS attack and DDOS attack. It is because in many sources these two terms used to refer the same/ similar type of attacks where both are using same techniques to shut down victim server. Later when I started learning network security, I realized the difference between DOS and DDOS. To learn more about DOS attack follow the link below. What is Denial Of Service Attack What is the Difference between DOS Attack and DDOS Attack Difference between Denial of Service Attack (DOS) and Distributed Denial of Service Attack (DDOS) lies in the number of participants included in the attack. In DOS Attack one computer is participating but in DDOS attack multiple computers are participating in the attack. Both are using the same technique to down the victim like sending too much connection requests to the victim and let the victim crash. The concept of botnet lies with DDOS Attack. Each computer part

What is TCP Split Handshake Attack and How it affect Server Security

Image
Computer network and IT Security professionals know the furious discussion going on about the last NSS lab report. This report is about the recent experiment they have conducted with popular security products. They tested different security products in 6 different situations and one of them "TCP Split Handshake Attack" was very successful for most of the products they have tested. They successfully breached the security of most of the Firewall products from different vendors using TCP Split Handshake Attack method. So what is TCP Split Handshake Attack? How it is a threat for current network? If we refer RFC 793 we can see how a TCP connection is established. TCP (Transmission Control Protocol) is a connection-oriented protocol and thus it needs a handshaking process to establish a successful connection. Diagram provided below explains the working of a handshake process. What is TCP Handshake? Before we go to Transmission Control Protocol Split Handshake, we should

Steps to Deal With Malware Spreading Websites

The Internet is so big and so the threat is. We cannot trust every website are made for helping people by giving genuine information or service. There are many websites which are designed and hosted for a single purpose, spread malware products. They are infecting computers of many innocent users. As a responsible Internet user, it is your duty to join the activities of organizations against badware and malicious websites to make sure these bad websites are blacklisted. Your information will help these organizations to create a complete list of attacking websites and publish it for general users. If you are willing to help these organization, this article will help you to make right move. I found an Attack website, What Should I Do? Inform Google The first step you should take after discovering a malware-spreading website is to inform Google about this. Google is the most popular search engine and by blocking a malware-spreading website in Google, you can save many users. You

Set Firefox Check Web Server Certificate Mandatory to Ensure Security

Image
We are living in a world where security and user-friendly concepts fight each other. If one system is secure, definitely it will lack user-friendly nature. If one system is user-friendly, then it should suffer some security flaws. Reason for I am saying this is, many users (average users) want to use software or services without any troubles in terms of security. In the case of web security, as a normal user, it is our duty to ensure that the websites we are visiting have proper security certificates and safe to browse. One of the most recognized schemes for maintaining the security of a website is OCSP. OCSP stands for Online Certificate Status Protocol and it checks the status of the web server security certificate. There are 3 common responses usually get and they are currently expired, or unknown. If you are really concern about web safety, it is your duty to ensure that your browser always checks the certificate status of the website you are visiting. By default most browsers (I

Getting Warning, This Site May be Compromised in Google Search Results

Image
Today morning I got a call from one of my friends who is running an e-commerce website. His users are getting a warning about his website in Google Search Results,  This Site May be Compromised . He has no clue about how this error happened and there is no symptom of virus infection in his server. There are no Antivirus popups which saying potentially harmful site while loading his website in our computer. So I told him to login to his Google webmaster tools account and check whether there is any message from Google. In webmaster tools account we found a message with headline " Notice of Suspected Hacking on --- ". We got a list of sample URLs which are injected by third party sources. It helped us to identify the source and removed these files. Surprisingly there was no review link provided in Google Webmaster tools. So we believe Google will automatically check the pages after we remove the unwanted pages and remove the label "This Site May be Compromised&quo

Make Sure your Computer and Network are Safe and Secure

Network security is always a hot topic due to the various news about recent network intrusions and DDoS attacks. The corenetworkz team is always in our best efforts to teach our readers how to stop and prevent common cyber attacks. We have many useful articles which tell the nature, common techniques etc used by intruders and how to secure your computer and network from them. This post will guide you to our previous security-related articles in various niches like computer security, network security etc. Web Security Articles Below you can see a list of articles related to web security. How to Check a Website Safe to Browse or not How to Check my website is virus infected or not The Security Certificate has Expired or is not yet Valid - Reason and Solution Don't Get Fooled by MacDefender, a Fake Anti-Malware Program Steps to Deal With Bad Malicious Malware Spreading Websites Getting Warning, This Site May be Compromised in Google Search Results Can we re

Tools To Check Safety Of a Website

Image
There are so many fraudulent websites nowadays whose only intention is to sell crappy products or installing malware applications on visitors computers. First type websites alert the visitor about the presence of the virus and strongly recommend them to perform an online scan to detect them. Once the scan is finished, the visitor will be forced to pay a fee to remove the virus. Second types of websites directly install malicious applications on visitors laptop. Some are intentionally created to host malware programs while others are hijacked by a third-party person. Anyway, it is important to avoid visiting any infected websites to protect our computer. Fortunately, we have some tools to check whether a website is safe to browse. Tools To Check Safety Of a Website There are certain free tools to check whether a website is safe to browse or not. Most of these tools are free to use. Norton Safe Web Norton Safe Web is a free tool to check the possible threats posed by a websit

How to Check Virus infection On My Website - Reported Attack site

Image
Yesterday night I actually shocked while seeing one of my websites is reported as an attack site (Not this blog). In Firefox I saw the message "Reported Attack Page" and blocked access to my website. When I search my website in Google I saw the following alert on my website "This site may harm your computer". When I click on the Google Search Result of my website, it leads to another page which says, Malware Warning. It clearly shows the presence of malware on my website and it may harm my readers' computer. So I log in to the server (last time I logged in before one year, that too just upload this website) and check the source code. I really surprised to see a bunch of malicious script in my web pages. I really don't know how it came to my website (unfortunately this is a tiny server and no access to log files). Anyway, here I am writing a standard procedure to handle virus infection in your website. There is no need to panic while seeing a virus infection