This Blog Posts All Posts Directory Listings Articles

pfSense 2.3.2 is Available

08/28/2016 21:24:04 PM

pfSense 2.3.2, with 60 bug fixes, has been released. You can read more about this latest release at the official pfSense blog. I will update the download links ASAP. The post pfSense 2.3.2 is Available appeared first on pfSense Setup HQ.

pfSense 2.3.1 Update 5 Available

07/04/2016 15:17:21 PM

pfSense 2.3.1 update 5 is now available. This version incorporates 2 security fixes and 7 bug fixes. Timeline for recent pfSense updates: 4-12-2016: pfSense 2.3 released. This incorporated several changes, including a new user interface, the ...

Breaking News: pfSense 2.2.6 Available

12/22/2015 16:03:36 PM

You may have seen this already, but pfSense 2.2.6 is now available, with a few bug fixes and upgrades. For those already running any 2.2.x version, this is a low risk upgrade, but those on 2.1.x and earlier may have issues. I upgraded from 2.2.5 ...

Breaking News: pfSense 2.2.5 Now Available

11/06/2015 07:48:44 AM

pfSense 2.2.5 is now available, with a number of bug fixes and some security updates. It is considered a low risk upgrade for those running 2.2.x. For those running 2.1.x and older versions, there are a number of significant changes which may ...

Traffic Shaping in pfSense: Part Seven

11/02/2015 11:00:00 AM

After using the shaper wizard, you might find that the rules it generates do not fit your requirements. Fortunately, once the basic rules have been created by the wizard, it should be relatively easy to edit or copy those rules and create custom ...

Traffic Shaping in pfSense: Part Six

10/22/2015 05:00:03 AM

Traffic Shaping in pfSense: Raising and Lowering Protocols The last configuration screen of the pfSense traffic shaper wizard lists many other commonly available applications and protocols. How you chose to handle these protocols are handled ...

pfSense Setup HQ Mailing List Launched

10/19/2015 13:00:14 PM

In the first two days since I launched the official pfSense mailing list, several readers have already signed up. If you sign up for our mailing list, I’ll send you a brief pfSense resource guide that contains all the essentials on how to ...

Traffic Shaping in pfSense: Part Five

10/17/2015 09:00:28 AM

The next screen, “Peer-to-Peer Networking”, will let you set controls over many peer-to-peer (P2P) networking protocols. By design, P2P protocols will utilize all available bandwidth unless limits are put in place. If you expect P2P traffic ...

Free pfSense Resource Guide

10/16/2015 23:00:42 PM

I’m currently giving away a free pfSense resource guide explaining how to set up your own pfSense firewall in 3 easy steps to anyone who signs up for my (low-traffic) mailing list. See this page for more information.The post Free pfSense ...

Traffic Shaping in pfSense: Part Four

10/16/2015 15:15:46 PM

Once you enter the queuing disciples and connection speeds in the traffic shaper wizard, there are a number of other options to configure. The next is Voice over IP, and there are several options available for handing VoIP traffic. The first ...

Traffic Shaping in pfSense: Part Three

10/06/2015 05:00:07 AM

If you want to invoke traffic shaping in pfSense, you can write your own rule set in PF, but in most cases, it’s easier to use the traffic shaper wizard. To get started with the traffic shaper wizard, navigate to Firewall -> Traffic Shaper ...

Traffic Shaping in pfSense: Part Two

09/29/2015 05:00:19 AM

Wrapping a GUI around the underlying traffic shaping components in pfSense proved to be difficult. Lacking functionality in the underlying system in some areas also limits its capabilities. The traffic shaper was rewritten for pfSense 2.0 and ...

Traffic Shaping in pfSense: Part One

09/23/2015 18:00:19 PM

Traffic shaping, otherwise known as network Quality of Service (QoS), is a means of prioritizing the network traffic crossing your firewall. Without traffic shaping, all packets are processed on a first in/first out basis by your firewall. QoS ...

pfSense Multi-WAN Configuration: Part Seven

09/21/2015 15:00:46 PM

There are some scenarios where you may want to only use failover. Some pfSense users have a secondary backup Internet connection with a low bandwidth limit, and only want to use that connection if their primary connection fails, and only while ...

pfSense Multi-WAN Configuration: Part Six

09/19/2015 05:00:42 AM

In the previous articles, we covered the basics of multi-WAN configuration with pfSense. In this article, we will cover how to tailor your configuration to your particular needs. pfSense Multi-WAN: Bandwidth Aggregation and Service Segregation ...

pfSense Multi-WAN Configuration: Part Five

09/15/2015 15:00:09 PM

Once you have configured your multi-WAN setup, you will want to verify its functionality. In this article, we will cover how to test each component of your multi-WAN setup. If you have configured failover, you will want to test it after completing ...

pfSense Load Balancing

09/12/2015 17:00:20 PM

In the previous article, we covered how to set up load balancing for a multi-WAN configuration. In this article, we will cover load balancing and failover in cases that don’t involve multiple WAN interfaces. pfSense Load Balancing To configure ...

pfSense Multi-WAN Configuration: Part Four

09/09/2015 05:00:24 AM

The load balancing functionality in pfSense allows you to distribute traffic over multiple WAN connections in a round-robin fashion. This is done on a per-connection basis. A monitoring IP is configured for each connection, which pfSense will ...

pfSense Multi-WAN Configuration: Part Three

09/04/2015 16:00:38 PM

Some multi-WAN configurations require special workarounds because of limitations in pfSense. This article covers those special cases. Because of the way pfSense distributes traffic over multiple Internet connections using the same gateway IP, ...

pfSense Multi-WAN Configuration: Part Two

09/02/2015 10:00:14 AM

In the first article, we covered some basic considerations with a multi-WAN setup. in this article, we will cover multi-WAN configuration. First, the WAN interfaces need to be configured. You should set up the primary WAN the same way you would ...

pfSense Multi-WAN Configuration: Part One

08/25/2015 16:00:48 PM

pfSense incorporates the ability to set up multiple WAN interfaces (multi-WAN), which allows you to utilize multiple WAN connections. This in turn enables you to achieve higher uptime and greater throughput capacity (for example, if the user ...

Configuring Dynamic DNS in pfSense

08/21/2015 16:00:44 PM

Dynamic DNS (DDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DNS configuration of its configured hostnames and/or addresses. The term is used to describe two separate ...

Video: Configuring Dynamic DNS with pfSense

08/17/2015 14:00:52 PM

You may want to set up a domain name for your home or SOHO WAN IP. This video demonstrates how to do this. In this video I cover: What DDNS is, why you might want to use it, and different methods of implementing DDNS Configuring Duck DNS on ...

IPsec VPN Configuration in pfSense: Part One

08/14/2015 16:00:37 PM

In the previous article, we covered how to set up a PPTP VPN connection in pfSense, and how to connect to it in Mint Linux. Since PPTP relies on MS-CHAPv2, which has been compromised, we probably want to use another method if security is paramount. ...

PPTP VPN Configuration in pfSense

08/08/2015 08:00:07 AM

A virtual private network is a means of extending a private network across a public network. The public network is most commonly the Internet, although not always. It enables a computer or network-enabled device to send and receive data across ...

Video: Upgrading a pfSense Firewall

08/05/2015 08:00:17 AM

This week, I upgraded my pfSense firewall from version 2.2.3 to 2.2.4. This video documents the process. If you’re running an old version of pfSense and want to bring it up-to-date, all that is required is a few mouse clicks and some time.The ...

Video: Configuring a Second WAN Gateway in pfSense

08/03/2015 16:00:22 PM

This video describes how to configure a second WAN gateway for a multi-WAN setup in pfSense. [Hint: It doesn’t take long.]The post Video: Configuring a Second WAN Gateway in pfSense appeared first on pfSense Setup HQ.

Video: Setting Up VLANs in pfSense

07/28/2015 15:30:07 PM

A single layer 2 network can be partitioned into two or more broadcast domains so we don’t have to add switches every time we want to add another network. This video shows how to set up 802.1Q VLANs with pfSense.The post Video: Setting Up ...

Video: Demonstration of Squid Overriding Firewall Rules in pfSense

07/27/2015 15:00:01 PM

One phenomenon I initially didn’t understand is the fact that once Squid is enabled in an interface, it overrides any firewall rules you might have for ports that are controlled by Squid (80 and, if you enable the SSL proxy, 443). This is ...

Breaking News: pfSense 2.2.4 Released

07/27/2015 10:05:58 AM

pfSense 2.2.4 has been released, which incorporates multiple security and bug fixes. Some things you probably should know about this upgrade: You can upgrade from any previous version straight to 2.2.4. It is considered a low risk upgrade. It ...

Video: Installing and Configuring Squid3 in pfSense

07/21/2015 17:00:23 PM

In this video, I demonstrate how to install and configure the Squid3 package in pfSense. Although the older version of Squid is generally considered more stable, Squid 3.0 incorporates a number of features not included in the older Squid, including ...

Video: Installing and Configuring the Squid Proxy in pfSense

07/20/2015 17:00:16 PM

In this video, I discuss what a proxy is, why you might want to use one, and how to install and configure the Squid package in pfSense. It’s so easy that it takes only a few minutes to install and configure Squid.The post Video: Installing ...

Video: pfSense Rule Advanced Options

07/13/2015 16:00:59 PM

In this video, I use advanced firewall rule options to create a rule that only applies to Windows systems.The post Video: pfSense Rule Advanced Options appeared first on pfSense Setup HQ.

Video: Rule Scheduling with pfSense (part two)

07/11/2015 09:00:37 AM

This video provides more examples of using scheduling in pfSense. I alter one of the rules created in a previous video so it is only enforced during work hours, while still allowing access during the lunch hour.The post Video: Rule Scheduling ...

Video: Rule Scheduling with pfSense

07/10/2015 17:00:50 PM

In the previous video, I covered how to block a website with pfSense. But we may not want to enforce rules at all times. No worries…pfSense makes it easy to use scheduling so rules are not always enforced, as demonstrated in the following ...

Video: Blocking Websites with pfSense

07/08/2015 13:15:20 PM

In this video, I cover how to block a website using pfSense rules two different ways: [1] using a single IP address; [2] using an alias to block multiple IP addresses. Once again, pfSense makes the whole process surprisingly easy.The post Video: ...

Video: Configuring a DMZ with pfSense

07/03/2015 17:05:49 PM

Here’s a video I made about setting up a DMZ with pfSense. In this video, I do the following: Assign the DMZ interface. Set up DHCP on the DMZ interface. Create a firewall rule to prevent the DMZ from accessing the LAN. Test the configuration. ...

BREAKING NEWS: pfSense 2.2.3 Released

06/26/2015 07:32:13 AM

pfSense 2.2.2 has been released, containing 2 low-risk security updates. I will update the links on the downloads page ASAP. You can read all about the newest version at the official pfSense blog. The page also has links to the download mirrors, ...

BREAKING NEWS: pfSense 2.2.2 Released

04/15/2015 16:25:30 PM

pfSense 2.2.2 has been release, containing 2 low-risk security updates. I will update the links on the downloads page ASAP. You can read all about the newest version at the official pfSense blog. The page also has links to the download mirrors, ...

Siproxd: Part One

01/23/2015 18:00:14 PM

Siproxd is a proxy/masquerading daemon for the SIP protocol. It handles registrations of SIP clients on a private IP network and performs rewriting of the SIP message bodies to make SIP connections work via a masquerading firewall (NAT). It ...

Reader’s Mailbag: 1-7-2015

01/07/2015 06:00:52 AM

I received an e-mail from a reader stating that even though he had an internet connection, he could not access the internet through his pfSense firewall. It occurred to me that there might be several reasons why this might be the case: pfSe ...

Nagios Installation and Configuration: Part Two

12/09/2014 16:00:25 PM

In the previous article, we introduced Nagios and began covering installation. In this article, we will continue our look at Nagios, covering configuration and installation of plugins. Nagios Configuration Now that Nagios has been installed, ...

Nagios Installation and Configuration: Part One

11/26/2014 16:00:13 PM

Nagios is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. It enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes, ...

netio: A Network Benchmark Tool

11/17/2014 16:00:15 PM

netio is a network benchmark utility for OS/2 2.x, Windows, Linux and Unix. It measures the net throughput of a network via TCP and UDP protocols using various different packet sizes. For netio to run a benchmark, one instance has to be run ...

HAProxy Load Balancing: Part Three

11/11/2014 05:00:11 AM

In the previous two articles in this series, we introduced HAProxy and began looking at configuration of HAProxy under pfSense. In this article, we conclude our look at HAProxy configuration. In the HAProxy Listener configuration tab, we had ...

Amazon Affiliate Purchases: October 2014

11/08/2014 11:35:17 AM

Here are some of the items readers bought through my Amazon affiliate links: Coolerguys Programmable Thermal Fan Controller with LED Display EnGenius Technologies Dual Band 2.4/5 GHz Wireless AC1200 Router with Gigabit and USB (ESR1200) Fan ...

HAProxy Load Balancing: Part Two

11/03/2014 16:00:09 PM

In the previous article, we introduced HAProxy as a load balancing solution for TCP and HTTP-based applications. In this article, we will continue our look at HAProxy configuration. The next setting in the “Settings” tab is “Global

New Python Site Launched

10/28/2014 11:39:20 AM

Anyone who has an interest in the Python programming language might want to take a look at my latest site, pythonscript.net. I only have a few articles posted so far, but I am setting a goal of posting at least two articles a week. As someone ...

HAProxy Load Balancing: Part One

10/27/2014 08:00:57 AM

HAProxy is an application offering high-availability, load balancing and proxying for TCP and HTTP-based applications. It is particularly suited for high traffic web sites, and is used by a number of high-profile websites including GitHub, Stack ...

Bandwidth Monitoring with BandwidthD

10/20/2014 16:00:28 PM

BandwidthD tracks usage of TCP/IP subnets and builds HTML files with graphs to display utilization. Charts are built for individual IP addresses, and by default display utilization over 2 day, 8 day, 40 day, and 400 day periods. Furthermore, ...

pfSense 2.1.5 Released

08/28/2014 16:57:54 PM

If you’re on the pfSense mailing list, you probably know this already, but pfSense 2.1.5 has been released. It is primarily a security update (including a fix to OpenSSL), but if you want to see a full list of fixes, you can read about it ...

VPN Tunneling with tinc

08/28/2014 08:00:48 AM

tinc is a Virtual Private Network (VPN) daemon that uses VPN tunneling and encryption to create a secure private network between hosts on the Internet. Because the tunnel appears to the IP level network code as a normal network device, there ...

Network Traffic Monitoring with vnStat

08/25/2014 08:00:28 AM

vnStat is a console-based program for network traffic monitoring in Linux and BSD. It keeps a log of hourly, daily, and monthly network traffic for the selected interfaces. It uses the network interface statistics provided by the kernel as an ...

Unbound DNS: Additional Settings

08/19/2014 08:00:30 AM

In the previous article, we introduced Unbound and covered some of the most common settings. In this article, we will cover some additional settings. Under Services -> Unbound DNS, the “Unbound DNS Settings” tab has a subheading called ...

Unbound DNS

08/15/2014 08:00:20 AM

Unbound DNS is a validating, recursive and caching DNS server software product. The C implementation of Unbound is developed and maintained by NLnet Labs, and is based on ideas and algorithms taken from a Java prototype developed by Verisign ...

Securing Ports and Services

08/11/2014 08:30:40 AM

A computer system that is not connected to a network is a rarity. While this provides some flexibility in terms of remote services, data and information that are available, it also brings considerable risks. It is probably correct to assume ...

Software Exploits

08/04/2014 16:00:50 PM

A software exploit is a piece of software or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur. Software applications and the operating systems on which ...

TCP/IP Hijacking

07/30/2014 16:00:40 PM

TCP/IP hijacking is a technique that uses spoofed packets to take over a connection between a victim and a host machine. It is similar to a man-in-the-middle attack, except that the rogue agent sends a reset request to the client so that the ...

Replay Attacks and Possible Countermeasures

07/23/2014 16:00:30 PM

Replay attacks are a variation on the man-in-the-middle theme. In a replay attack an agent is once again placed within the client/server line of communication. In the case of a replay attack, however, the transaction data is recorded for the ...

Man-in-the-Middle Attacks

07/22/2014 08:00:55 AM

Man-in-the-middle attacks are perhaps one of the more complex and sophisticated forms of security breaching approaches. As the name implies, such an attack involves the surreptitious placement of a software agent between the client and server ...

IP Spoofing and Defenses

07/17/2014 08:00:58 AM

IP address spoofing is the creation of IP packets with a source IP address with the purpose of concealing the identity of the sender or impersonating another computer system. The basis of spoofing involves masquerading as a trusted system in ...

Phishing: Common Variations

07/14/2014 08:00:47 AM

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details be masquerading as a trustworthy entity in electronic communications. Communications purporting to be from popular social networking ...

Back Door Attacks

07/08/2014 16:00:42 PM

Back door attacks utilize programs that provide a mechanism for entering a system without going through the usual authentication process. This can either take the form of hidden access points intentionally put into an application by the original ...

Distributed Denial of Service (DDoS) Attacks

07/07/2014 08:00:29 AM

In the previous article, we discussed denial of service (DoS) attacks. These attacks involve the use of a single client to launch an attack on a system or service. Distributed denial of service (DDoS) attacks use the same basic attack methodologies ...

Denial of Service (DoS) Attacks

07/02/2014 08:00:37 AM

Denial of Service (DoS) attacks are undertaken with the express purpose of preventing users from accessing and using a service they should otherwise be able to access. such attacks make malicious use of a variety of different standard protocols ...

MailScanner Installation and Configuration: Part Two

06/30/2014 16:00:31 PM

In the previous article, we introduced MailScanner and covered installation as well as basic configuration. In this article, we will look at some of the other configuration options. If we navigate to Services -> MailScanner, there are nine tabs. ...

pfSense 2.1.4 Released

06/25/2014 17:00:20 PM

pfSense 2.1.4 has been released, about 2 months after pfSense 2.1.3. It is primarily a security release. Packages had their own individual fixes and need updating as well. For a full list of the fixes (security and otherwise) made in this version ...

MailScanner Installation and Configuration: Part One

06/24/2014 08:00:15 AM

MailScanner is an e-mail security and anti-spam package for e-mail gateway systems. It is not designed to be run on Microsoft Windows desktop PCs. Instead, it is designed to be run on mail servers operated by companies and ISPs so that all their ...

Using the OLSR Daemon in pfSense

06/18/2014 16:00:35 PM

The OLSR daemon is an implementation of the Optimized Link State Routing protocol. The Optimized Link State Routing Protocol is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. ...

Service Discovery with Avahi

06/16/2014 16:00:16 PM

Avahi is a free zero-configuration networking implementation, including a system for multicast DNS/DNS-SD service discovery. It is licensed under the GNU Lesser General Public License (LGPL). It allows programs to publish and discover services ...

BEAST Attack Mitigation in pfSense

06/14/2014 16:00:51 PM

On September 23, 2011 researchers Thai Duong and Juliano Rizzo demonstrated a proof of concept called Browser Exploit Against SSL/TLS (BEAST). A BEAST attack involves intercepting and decrypting HTTPS cookies. Whenever you log into an HTTPS ...

Virus Check with HTTP AntiVirus Proxy

06/12/2014 08:00:41 AM

HTTP AntiVirus proxy (HAVP) is a proxy with an anti-virus filter. it does not cache or filter content, but completely scans incoming traffic while doing a virus check. The main objectives of HAVP are: [1] continuous and non-blocking downloads, ...

Backup Your Network with Bacula

06/09/2014 08:00:31 AM

Bacula is an open source, enterprise-level computer backup system for heterogeneous networks. It is designed to automate backup tasks that had often required intervention from a systems administrator. Bacula supports Linux, UNIX, Windows and ...

UPS Monitoring with NUT in pfSense

06/05/2014 04:00:12 AM

Network UPS Tools (NUT) is a collection of programs which provide a common interface for UPS monitoring and administering, as well as monitoring and administering PDU (power distribution unit) and SCD (secure cryptographic device) hardware. ...

Amazon Purchases

06/04/2014 10:29:30 AM

Here are a a few items pfsensesetup.com readers purchased through our Amazon affiliate links: BitFenix Recon Black Fan Controller (BFA-RCN-KS-RP) Cooler Master SickleFlow 120 – Sleeve Bearing 120mm Blue LED Silent Fan for Computer Cases, CPU ...

Web-Based SSH with Anyterm

06/03/2014 04:00:23 AM

Sometimes, you may want to access Secure Shell (SSH) servers but the access point you are using blocks port 22 or whatever port your SSH server is using. Fortunately, there is a solution: web-based SSH makes it possible to access SSH servers ...

Reverse Proxy Services with Varnish (Part Three)

05/31/2014 16:00:22 PM

In the last two articles, we introduced the Varnish reverse proxy and covered installation and basic configuration. In this article, we will cover the remaining configuration options. The third tab on the Varnish settings page is “Custom ...

Reverse Proxy Services with Varnish (Part Two)

05/27/2014 16:00:50 PM

In the last article, we introduced Varnish, a powerful reverse proxy server, and covered installation and basic configuration. In this article, we will continue to look at some of the configuration options. We will begin by looking at the settings ...

Reverse Proxy Services with Varnish (Part One)

05/26/2014 04:00:55 AM

I recently ran a series of articles on Squid, a proxy server which began life as a client-side cache and can be used under pfSense as such. In contrast, Varnish is a reverse proxy HTTP accelerator designed for content-heavy dynamic web sites. ...

pfSense Configuration: A Scrounger’s Guide (Part Three)

05/23/2014 16:00:46 PM

In the last article, we covered selection and installation of hardware for our new pfSense system, as well as the installation and initial pfSense configuration. In this article, we will continue with pfSense configuration. At this point, I ...

pfSense Installation: A Scrounger’s Guide (Part Two)

05/21/2014 04:00:02 AM

In the last article, I discussed my project to turn an old computer into a pfSense firewall and set some guidelines for the project. In this article, I get to configuration of the pfSense box and pfSense installation. pfSense Installation: Selecting ...

pfSense Hardware: A Scrounger’s Guide (Part One)

05/19/2014 04:00:13 AM

When I started using pfSense as my primary firewall, it replaced my previous firewall solution: a Pentium P-233 running m0n0-wall. I eventually switched to a Neoware thin client running pfSense, which I ultimately upgraded to version 2.1.3. ...

Web Filtering with SquidGuard: Part Two

05/17/2014 10:00:39 AM

In the previous article, we discussed how to install SquidGuard and began to look at configuration options, focusing on blacklists and access control lists. In this article, we continue our look at SquidGuard configuration. Filtering Sites By ...

Web Filtering with SquidGuard: Part One

05/14/2014 04:00:42 AM

Now that we’ve covered both Squid and LightSquid, I thought it might be useful to cover some other Squid plugins. In this article, we will cover how to implement web filtering with SquidGuard. SquidGuard is a URL redirector software, which ...

Log File Analysis with LightSquid

05/12/2014 04:00:56 AM

In the previous article, we covered installation and configuration of Squid under pfSense. In this article, we will cover how to monitor Internet usage with Squid and by installing and using the Squid log file analyzer LightSquid. LightSquid ...

Squid Proxy Configuration in pfSense

05/09/2014 16:00:26 PM

Squid is a proxy server and web cache daemon. It was originally developed as part of the Harvest project at the University of Colorado Boulder. Further work on the program was completed at the University of California, San Diego (UCSD) and funded ...

Video: pfSense on a Flash Drive (Part One)

05/06/2014 12:00:59 PM

A reader e-mailed me asking the pros and cons of running pfSense from a flash drive. I wasn’t sure myself, so I got a flash drive and tried it myself. In part two, I will try to run pfSense from the flash drive on one of my computers.The post ...

Arping with pfSense: Installation and Use

05/05/2014 04:00:16 AM

Arping is a computer software tool that is used to discover hosts on a computer network, and is available as a package for pfSense. The program tests whether a given IP address is in use on the local network, and it can get additional information ...

pfSense 2.1.3 Released

05/03/2014 15:58:02 PM

pfSense 2.1.3, a relatively minor upgrade from the recently-released 2.1.2, has been release. You can read about it in this blog posting at the official pfSense site. I decided to upgrade my firmware to the latest version, and even made a video ...

Vulnerability Scanning: What It Won’t Fix

04/30/2014 16:00:46 PM

  Security Issues That Won’t Be Fixed By Vulnerability Scanning While vulnerability testing is a valuable tool in your security arsenal, you should not think of it as a silver bullet. There are still situations and areas that a vulnerability ...

Vulnerability Scanning Tips

04/28/2014 16:00:16 PM

Before you start vulnerability scanning, you should take into consideration some issues. Port scanning is a fairly innocuous activity, althouh it is annoying when you see the activity showing up in your logs. Vulnerability testing, however, ...

Nessus Configuration: Part Two

04/26/2014 16:00:59 PM

The Nessus GUI configuration menu contains several configurable options. For example, this is where the maximum number of checks and hosts being scanned at one time, the resource you want nessusd to use and the speed at which data should be ...

Nessus Configuration: Part One

04/23/2014 04:00:57 AM

Nessus Configuration: Proxy and Advanced Settings The first thing you will see when you access Nessus is the login page. You must first enter the login name and password you created when you set up Nessus. Since Nessus uses a web-based front ...

Nessus Installation: A Guide

04/21/2014 16:00:23 PM

Nessus Installation and Setup In the previous article, we discussed some of the features and capabilities of Nessus 5. Here we will discuss downloading and installing the program. There are two prerequisites you must have before you begin Nessus ...

Nessus Features and Capabilties

04/17/2014 04:00:11 AM

In the previous article, we introduced the Nessus vulnerability scanner. In this article, we will discuss some of the additional Nessus features. Nessus Features: Scripting Language, Integration with Other Tools, Smart Testing To supplement ...

Nessus Vulnerability Scanner: An Introduction

04/15/2014 16:00:57 PM

Introducing the Nessus Vulnerability Scanner Modern computer networks have multiple potential areas of insecurity. How do you protect all these avenues of attack? You might feel that protecting your network is an impossible situation. You could ...

Useless Services

04/14/2014 04:00:46 AM

Useless Services Like a vestigial tail, there are often applications running on our machines that no longer serve any useful purpose. These services may be part of an earlier set of libraries that the programmers built on and never bothered ...

Uses for Nlog and Nmap

04/12/2014 16:00:33 PM

Uses for Nlog and Nmap So now you can port scan with Nmap and sort and analyze the results with Nlog. what can you do with these programs? There are, indeed, some interesting applications for port scanners. Here are some examples for you to ...

Nlog Add-Ons and Extensions

04/11/2014 04:00:54 AM

In the previous article, we discussed installing and using Nlog. In this article, we will discuss using add-ons and writing your own Nlog extensions. Nlog Add-Ons As mentioned earlier, Nlog is easily extensible and you can write add-ons to do ...

pfSense 2.1.2 Release Up For Testing

04/10/2014 16:13:35 PM

Unless you’ve been living in a broom closet, you probably know about the OpenSSL bug that makes users using sites whose web servers use the OpenSSL library potentially vulnerable to eavesdropping. The pfSense development team is on the case, ...