Introduction to JG Network Security

JGIT Security is a consultant firm that is focused on providing state-of-the-art Vulnerability Testing and Penetration Testing at a price that small businesses can afford. We specialize in securing SOHO networks, and finding vulnerabilities that should not cost thousands of dollars to find. We are in business with the purpose of providing a service that everyone needs at a price that everyone can afford. Unless you are already interested in computer security, you most likely do not realize the importance of it. Many people do not realize how easy it is for external or even internal attackers to penetrate their systems and networks and to obtain or alter confidential or personal data without being noticed. Unless you are already doing everything you can to secure your system and employing a security team on a full-time basis to protect your information, there is most likely a way to infiltrate and steal data that is not meant to be public.
     Many people think “Why would anyone target me?”  Well, viruses, spyware, and botnets do not care about who you are or what you do.  They simply look for vulnerable entrypoint connections and when they find them they will immediately enter and often they will alert someone or something that this entrypoint is available.  Once inside, they will begin infecting files and creating backdoors which enable other malware to join them in the party of infecting your machine.
     Often people think, Oh I have anti-virus, or Anti-spyware, so I am protected. Well, simply having anti-spyware is not enough.  You must be sure to continuously update your Anti-virus signatures which inform the anti-virus program about the newest viruses and what they look like.  However, there are also millions of Zero-Day exploits discovered as well, which are new vulnerabilities that have not yet been identified and therefore not able to protect against with simply anti-virus.  There are ways to protect against these using either an IPS or IDS, which I will discuss later.
     You would be amazed at the number of malicious attackers and black hat hackers out there, and how easy it is to infiltrate a network or computer.  Having a router will not always protect you from attacks from outsiders, because many applications that are running on your computers today will establish a connection to the internet by opening up a port in your router.  Once that port is opened, a malicious attacker can then use a vulnerability in that application to exploit your computer.
     The most common way that most spyware will infect you is by you clicking on something that allows it to install something on your computer, or by downloading a trojan from the internet.  For example, you want to install a game on your computer so you google it and then go and download the game from a site where the game has been replaced with the exact same application but with some type of malware embedded inside of it.  This happens more often than most people think.  Just because you think that the site is safe, doesnt mean that an attacker hasnt replaced the valid file with a trojan unbeknownst to the site administrator. 

Anonymous not able to shut down internet…

Most likely the threat by Anonymous to shut down the internet on March 31st is just an April Fools Day joke a day early.  It is something that would not be easy at all to accomplish.  There are several main servers that have caches in them and put simply, In order to shut down the internet completely, They would have to stop every one of the main servers for like 48 hours until there caches ran out.  For more info on this listen to Steve Gibson from GRC.com’s latest SecurityNow podcast sn0441 on twittv or simply google it for a download link.

Hacking Wifi with ALFA and Backtrack 5r1

there are a few good sources to learn about hacking with backtrack 5 using my ALFA USB wifi adapter AWUS036.  My favorite is CBT Nuggets Certified Ethical Hacker Volume 7 training video titled Hacking Wireless Networks.

James Conrad is my favorite instructor from CBT Nuggets.  He is funny and also skilled, and has taught me tons about hacking and Network Security.

Most of us don’t think twice as we sweep the perimeter of our homes before retiring

Why would we not do the same for our internal networks as well??

While we often can manage the

vulnerabilities around our homes by spending a few minutes

checking locks, etc., the task is much more difficult in a

distributed organization with tens or hundreds of thousands of

networked devices.

About JG IT Security and why you should contact them

JGIT Security is a consultant firm that is focused on providing state-of-the-art Vulnerability Testing and Penetration Testing at a price that small businesses can afford. We specialize in securing SOHO networks, and finding vulnerabilities that should not cost thousands of dollars to find. We are in business with the purpose of providing a service that everyone needs at a price that everyone can afford. Unless you are already interested in computer security, you most likely do not realize the importance of it. Many people do not realize how easy it is for external or even internal attackers to penetrate their systems and networks and to obtain or alter confidential or personal data without being noticed. Unless you are already doing everything you can to secure your system and employing a security team on a full-time basis to protect your information, there is most likely a way to infiltrate and steal data that is not meant to be public.