How to Configure Splunk to use a Web Proxy Server

Posted on 1 CommentPosted in General IT Info, Information Security

A Splunk server I installed was configured such that it could only communicate with hosts within the corporate network so it did not have direct internet access. This posed a problem when trying to use the “Browse Splunkbase” option in the Splunk administrator web interface. I also could not use the “iplocation” data-processing command. This […]

How to Block an IP Range with IPTables

Posted on Leave a commentPosted in Information Security

If you want to block a range of IP addresses from accessing your CentOS server you can issue the following IPTables firewall command: /sbin/iptables -I INPUT -m iprange –src-range 192.168.1.1-192.168.1.2.100 -j DROP Replace “192.168.1.1-192.168.1.2.100” with the IP range you want to block. This command only works with the IPTables firewall so if your operating system […]

Declassified NSA Document Which Reveals the Story Behind the Discovery of TEMPEST

Posted on Leave a commentPosted in Information Security

The NSA recently declassified a document which revels the story behind how the United States first discovered the security threat of TEMPEST. TEMPEST is defined in Wikipedia as: TEMPEST is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, disclose […]