Posts

Showing posts from May 29, 2011

Who is the maker of Taliban

Who is the maker of Taliban America is the maker of Taliban from the start and still he is making Taliban. In Start he support Taliban and Usama Bin Laden against Russia. When he get the result and break the Russian federation. When American fulfill his desires then he don’t need any more Taliban support. He Attack on Afghanastan. In this attack million of Muslims where killed by American forces and the result is same he make more Taliban and Antiamerican. In Afghanastan attack Musharaf Government support America. This is big mistake by musharaf Government After support the Suicide Attack start in Pakistan. All the American media hide the truth from innocent American peoples. Actually the main target of America and Israel are Muslim Countries one by one Afghanistan, Iraq, Libya, and now the next target is Yaman, Sham and all other Muslim Countries in American list. Now through Drown Attack he is making more Taliban and anti American form Wazirastan (Pakistan).

Mumbai attacker Ajmal Kasab pleading BHAGWAN

Image
"Bhagwan mujhay maaf nahi karay ga". Is he even a muslim? Listen to his and Police officer's accent, they are same. KPK, GB, Sindh, Baluchistan, Punjab, this accent is NOT found in Pakistan, take my words.

if Pakistani are Taliban who are you Indians

Image
See the Real Face of Indian media, Pakistan have one case and India have several cases but no international media can see this what happening in india.

Signature Engine AIC Atomic ARP meta Engine

1.1.1.1 Signature Engine A signature engine is a part of the IPS that is designed to support many signatures in a specific category. Every engine has a set of factors that have acceptable ranges or sets of values. IPS 6.0 consist of the following signature engines: AIC (Application Inspection of Control) Engine that provides by analysis of web traffic. The AIC engine provides control over HTTP sessions to prevent harmful traffic of the HTTP protocol. It has the ability of administ rative control over different software, such as instant messaging etc . AIC can also be used to inspect FTP (File Transfer Protocol) traffic and control the commands being issued. There are two AIC engines: F AIC FTP F AIC HTTP Atomic Engine these engines are now combined i nto two engines with more than one level selection. Layer 3 and Layer 4 attributes can also be combined w ithin one signature, such as IP and TCP. Atomic ARP Engine is used to i nspec

Signature Detection protect network against attacks

1.1.1.1 Signature Detection Protecting the network against known attacks . Attackers often attack networks through tried and tested techniques from previously successful methods. These threats have been analyzed by network security engineers and a listed profile, or specific signature has been created. Signature detection methods examine network by looking for the threat’s fingerprint inside the network traffic and matching against an internal database of known attacks. Once an attack signature is determined, the security device delivers an attack response, mostly in a form of simple alarm or alert. Success in preventing these threats depends on the minute database of attack signatures, compiled from previous records. The drawback to systems on signature detection is clear: they can only detect threats for which there is a defined signature. If signature detection methods are employed to protect networks, the network is protected against known attacks only. 1.1.1

Why IDS/IPS should be used

Why IDS/IPS should be used? F It’s a fact that while every network has a firewall, most still have an effect on network security issues. IT professionals are conscious of the need for extra protective technologies, and network tools vendors are worried to fill in the gap. F IPS have been endorsed as cost-effective ways to drop malicious activities, to become aware of worm and virus attacks, to be responsible as a network sensing point, to support in fulfillment requirements, and to act as a network disinfecting agent. In network security firstly consider Firewall . Firewalls is considered as a first level of protection in a network security architecture, acting as an access control application by allowing specific protocols (like HTTP, DNS, SMTP) to pass through a set of source and destination addresses. Essential to access policy enforcement, firewalls usually examine data packet headers to make traffic flow decisions. Generally, they do not inspect the entire data