Unleashing Wireshark’s Powerful Follow TCP Stream Feature

In security courses such as Learning Tree’s System and Network Security Introduction, we often hear about the insecurity of protocols such as Telnet. These older protocols send their data – including login credentials – over the network in the clear. While ssh, a secure alternative to Telnet, is used in many applications today, many sites […]
Read More ›

SharePoint Security Best Practices

Yes, you can have security and performance! Microsoft has long used the same “object oriented” approach to security within its various “object namespaces”. SharePoint is no different. And Microsoft does have some SharePoint Security Best Practices you may want to consider. Objects and Security Ah… what is an “object namespace” you ask? The Microsoft platform […]
Read More ›

Introduction to UNIX-family File Permissions

Learning Tree’s System and Network Security Introduction course begins with a description of the four fundamental concepts of cyber security: authentication, confidentiality, integrity, and availability. That leads into a discussion of authorization: “who is allowed to do what.” The conclusion is the “access equation”: Authentication + Authorization = Access (We also discuss situations where access is […]
Read More ›

Ways to Manage Your SSH Keys and Identities

I wrote a series of blog posts a while ago about SSH authentication using cryptographic keys rather than passwords. I discussed why SSH keys provide easier authentication, how to set up an SSH key agent, and how to maintain multiple websites. There are two areas of security to consider regarding SSH. I think of them […]
Read More ›

Sharing Passwords is Bad, but Should It Be Illegal?

“Don’t share your passwords with anyone!” We say it repeatedly in Learning Tree’s System and Network Security Introduction, and I’m sure I’ve said it on this blog more than once. It’s bad practice; it leads to potential insecurity, and it means systems aren’t able to properly account for use. Sharing passwords is also illegal in some […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.