Remove Education Remove Honeypots Remove Passwords Remove Sales
article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

In this simple environment network security followed a simple protocol: Authenticate the user : using a computer login (username + password) Check the user’s permissions: using Active Directory or a similar Lightweight Directory Access Protocol (LDAP) Enable communication with authorized network resources (servers, printers, etc.)

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

You had to figure out how to configure Kermit, get passwords to get on. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. In both areas, you know, we never had sales guys until last year, so that's going on from like, 2006 Until last year. Let's analyze stuff. That was really fun.

IT 40