HackDig : Dig high-quality web security articles for hackers

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to optimize the performance of users and solve the problem of some users unable to obtain an IP.Most routers feature an “Advanced Settings” section that manages
Publish At:2020-08-03 10:15 | Read:428 | Comments:0 | Tags:Networking feature general security

CISCO Prime Data Center Network Manager affected by two critical flaws

Cisco èiblished two security advisories to warn customers of the presence of two critical vulnerabilities in the CISCO Prime Data Center Network Manager, Cisco warns its customers of the presence of two critical vulnerabilities in the CISCO Prime Data Center Network Manager (DCNM) that can be exploited by remote attackers for code execution and to access th
Publish At:2017-06-09 11:35 | Read:5566 | Comments:0 | Tags:Breaking News Hacking CISCO Prime Data Center Network Manage

Get all the Docker talks from Tech Field Day 12

As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group.  The final event was Tech Field Day 12 hosting in Silicon Valley. In case you
Publish At:2017-05-24 19:06 | Read:4315 | Comments:0 | Tags:Docker Education Engine Events Networking Security docker fo

Introducing Moby Project: a new open-source project to advance the software containerization movement

Since Docker democratized software containers four years ago, a whole ecosystem grew around containerization and in this compressed time period it has gone through two distinct phases of growth. In each of these two phases, the model for producing container systems evolved to adapt to the size and needs of the user community as well as the project and the g
Publish At:2017-05-24 19:05 | Read:4636 | Comments:0 | Tags:Engine Engineering Networking News Orchestration Registry Re

Announcing LinuxKit: A Toolkit for building Secure, Lean and Portable Linux Subsystems

  Last year, one of the most common requests we heard from our users was to bring a Docker-native experience to their platforms. These platforms were many and varied: from cloud platforms such as AWS, Azure, Google Cloud, to server platforms such as Windows Server, desktop platforms that their developers used such as OSX and Windows 10, to mainframes an
Publish At:2017-05-24 19:05 | Read:4829 | Comments:0 | Tags:Docker DockerCon Engine Engineering Networking Releases Secu

Understanding the Evolution of Network Security

Network security has been around almost as long as we’ve had networks, and it is easy to trace the various elements of network security to the components of networking that they try to mitigate. Over the past 30-35 years or so, the expansion of networking, especially the increased reliance on the Internet both as an avenue for commerce and as the corporate b
Publish At:2017-03-30 14:10 | Read:6824 | Comments:0 | Tags:Featured Articles IT Security and Data Protection DMZ networ

Justifying the Value of Conference Attendance to Your Boss

Over the weekend, I became immersed in a discussion on Twitter centered around getting more people involved in InfoSec conferences. Here’s the original post by @hacks4pancakes:Lesley’s initial point led to many great responses relating to the value of attending conferences and the process of communicating that value to the powers that be within your organiza
Publish At:2017-03-15 23:30 | Read:5336 | Comments:0 | Tags:Off Topic Conference Infosec networking

How to Conduct a Cost-Benefit Analysis and Implement a Virtual Private Network

Overview of the Last ArticleFor any business or corporation, securing the lines of communications between the sending and receiving parties is a top security priority. On a daily basis, billions upon billions E-Mail messages, text messages, instant messages, files, etc. are transmitted all over the world. Of course, not every business entity is going t
Publish At:2017-03-08 04:30 | Read:4769 | Comments:0 | Tags:Networking

Installing and Configuring CentOS 7 on Virtualbox

Unix based operating systems are ruling the web server OS market. According to the report created by W3techs, Unix is used by 66.5% of all the websites; whereas 33.5% websites are using Windows OS.Unix is clearly leading. Let’s break it down into the actual OS, because there are many operating systems based on Unix are available in the market. Ac
Publish At:2017-02-10 12:45 | Read:6693 | Comments:0 | Tags:Networking

Ethernet consortia trio want to unlock a more time-sensitive network

The demand from Internet of Things, automotive networking and video applications are driving changes to Ethernet technology that will make it more time-sensitive.Key to those changes are a number of developing standards but also a push this week from the University of New Hampshire InterOperability Laboratory to set up three new industry specific Etherne
Publish At:2016-11-11 12:30 | Read:4286 | Comments:0 | Tags:Networking Security Data Center Software

Hacker shows how easy it is to take over a city’s public Wi-Fi network

In a perfect example of how public wireless networks can be dangerous for privacy and security, an Israeli hacker showed that he could have taken over the free Wi-Fi network of an entire city.On his way home from work one day, Amihai Neiderman, the head of research at Israeli cybersecurity firm Equus Technologies, spotted a wireless hotspot that he hadn'
Publish At:2016-11-10 18:10 | Read:4038 | Comments:0 | Tags:Security Networking Hacking Wi-Fi

5 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, pro
Publish At:2016-11-07 16:50 | Read:4336 | Comments:0 | Tags:Security Virtual Private Network (VPN) Privacy Networking

An IoT botnet is partly behind Friday's massive DDOS attack

Malware that can build botnets out of IoT devices is at least partly responsible for a massive distributed denial-of-service attack that disrupted U.S. internet traffic on Friday, according to network security companies.Since Friday morning, the assault has been disrupting access to popular websites by flooding a DNS service provider called Dyn with an o
Publish At:2016-10-21 21:05 | Read:4678 | Comments:0 | Tags:Hacking Security Networking Internet Internet of Things DDOS

73% of companies using vulnerable end-of-life networking devices

Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000 Cisco networking devices at 350 organizations across North America."It's amazing how many folks have this issue in their environment," said David Vigna, Cisco practice director at Softch
Publish At:2016-09-28 16:45 | Read:4235 | Comments:0 | Tags:Networking Security Data Protection

BT Wi-Fi extender, extends to XSS and password changing vulnerabilities

Following an investigation by Pen Test Partners, British Telecom (BT) has released a firmware upgrade for their popular range of Wi-Fi extenders. The investigation uncovered vulnerabilities within the firmware when left the device exposed to possible XSS (Cross Site Scripting) Exploits as well as the ability to change the user’s password without notification
Publish At:2016-09-22 21:20 | Read:5424 | Comments:0 | Tags:Breaking News Hacking BT Cross-Site Scripting networking Wi-