ASPROX SQL Injection Attacks - Block them using a Cisco router
Here is an interesting one.
Basically, the ASPROX SQL Injection attack appears to be quite commonplace at the moment, but also quite serious.
To cut it short, there is a 20,000 strong botnet out there trying these attacks against websites which use .asp.
The tool actually uses google to search for these sites and then attempts to exploit them by inserting an HTML iFrame which downloads a malicious Java Script which then installs a Trojan.
Carry on reading to find out how to block this on a Cisco router!
The config is [...]
Intel, Micron to form flash-chip venture
Apple locks in iPod flash-memory supply through 2010
SAN FRANCISCO (MarketWatch) -- Intel Corp. and Micron Technology Inc. agreed Monday to form a new company that will make flash-memory chips, shaking up a fast-growing market driven by soaring sales of iPods, digital cameras and other portable devices.
The chipmakers will each pump in $1.2 billion to form IM Flash Technologies LLC, which will be 51% owned by Micron (US:MU) and 49% held by Intel (US:INTC). The companies will also contribute an additional $1.4 billion each over the next [...]
Asymmetrical Digital Subscriber Line (ADSL)
Asymmetric Digital Subscriber Line or ASDL is a newly proposed technology for very high speed transmission of data over twisted pair, telephone cable. Locate any and all information that you can about this technology. Link and Web pages to your report. Summarize the means, the speeds and the state of this new technology. Be sure to search current jounals and magazines for information of a substatial nature in addition to any Web information you locate.
The recent Telecommunications bill approved by Congress and signed off by President [...]
Routing and Switching
Switching: Forwarding and Filtering Traffic
routing and switching, Most protocols are foregone conclusions, so when building networks, many of the choices are not choices at all. It is highly probable that a network will be a mixture of Ethernet and 802.11 nodes. These nodes will run the Internet Protocol at Layer 3 of the Transmission Control Protocol/Internet Protocol (TCP/IP) networking model (see Figure 1-1). The applications will be designed for TCP or the User Datagram Protocol (UDP).
There are many types of switching: packet, circuit, multilayer, [...]
Internet Protocol Version 6 (or IPv6) is a successor of IPv4 Address standard developed by IETF, which is designed to solve IPv4 address exhaustion problem. IPv4 uses a 32-bit numbering scheme to represent an IP address, which has an address space of 232 or 4.3 billion. IPv6, on the other hand, uses 128-bit numbering scheme (2128) which has big enough address space for many decades to come. IPv6 is intended to replace the IPv4, but the introduction of CIDR (Classless Inter-Domain Routing) allocation scheme in 1993 within the IPv4 prolonged lifespan of IPv4 Addresses. With an anticipation[...]
Routing Switch what does that mean?
routing switch is a specialized type of switch that also performs many of the tasks of a router.
Routing switches are very similar to a typical router and in many cases they also inspect the incoming/outgoing network traffic, support of all major routing protocols and most of the routing of data/traffic to the next hop/router. However, routing switches also include switching abilities, and can forward data according to a device's physical address. The main difference between a routing switch and a router is in their hardware [...]
Routing and Internet addressing are two important concepts involved in networking. Routing First-Step covers the basics of routing in clear, easy-to-understand language.
IP header format
Unlike the post office, a router or computer cannot determine the size of a package without additional information. A person can look at a letter or box and determine how big it is, but a router cannot. Therefore, additional information is required at the IP layer, in addition to the source and destination IP addresses. Figure 3-12 is a logical representation of the information that is used at the[...]
MPLS (Multiprotocol Label Switching)
MPLS (Multi-Protocol Label Switching) provides a mechanism for forwarding packets for any network protocol. It was originally developed in the late 1990s to provide faster packet forwarding for IP routers (see RFC 3031). Since then its capabilities have expanded massively, for example to support service creation (VPNs), traffic engineering, network convergence, and increased resiliency.
Multi-Protocol Label Switching is now the de-facto standard for many carrier and service provider networks and its deployment scenarios continue to grow.
What is the basic concept of IP VPN? What are the components of its frame? How do I transmit IP over the VPN network? How do we go about addressing in a VPN network? What are the parameters that I needed to look at to when managing IP VPN?
The basic concept of a VPN is to connect networks in separate offices making them appear as one network or to connect remote individuals to their corporate network making them appear as though they were physically on the same network. With a VPN separate networks and individuals are "virtually" present. PCs, servers, printers and other devices all [...]
Ethernet Cable Identification and Use
Category 5, Cat. 5e, Cat. 6, Cat. 6a, Cat. 7, and Cat. 7a Cable Comparison
So you've got a bundle of ethernet cables and you're not really sure if you should use them in your network, this short guide should help you identify and correctly use any of the common ethernet cables you are likely to run across.
Identify the Cable
As you see above almost all ethernet cabling has the category of cabling printed on the side (hover over an image for the caption). The category shows what bandwidth the cable is rated to carry. If you encounter anything [...]