A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site


AVG Antivirus

Already protecting over 180 million users, download AVG Antivirus to protect you computer.

Pf Sense

In today’s world of increasing cyber-attacks, we cannot live without firewalls. A firewall is a hardware or software network security system designed to restrict unauthorized traffic to the restricted segment of a network. In a typical scenario, services that are not supposed to be reachable outside a subnet are restricted in a firewall. There are various good choices of hardware firewalls implementation in the market however in a situation where cost is a concern, cheaper options such as pfSense can be used.

fpSense is a complete  firewall software package used with PC to provide all important features of a commercial firewall devices. pfSense is based on customized FreeBSD operating system and with  LightPD web server and PHP, pfsense also has a very good web interface that simplify its administration.

Apart from providing firewall capabilities, pfSense also has powerful and flexible routing capabilities and can also be used as a Wireless access point, VPN Appliance as well as a DHCP Server appliance. pfSense software can work well in a complex network and can secure your network  at a budget.

TZ-CERT advices you to consider implementing software firewall with pfSense if you have a network that does not have a firewall and cost is a concern.

Apart from pfSense there are other firewall implementation for you to consider. Some of them are smoothwall and Untangle NG.

You can learn more about pfSense in their website https://www.pfsense.org/


SNORT, is a free and open source Intrusion Detection and Prevention System developed by Sourcefire. Snort utilizes the combination of signatures, protocol and anomaly based inspection to detect malicious traffic passing through. Snort performs packet logging, log analysis, content searching and matching on real time basis to be able to detect attacks such as buffer overflows, stealth port scans, CGI attacks, SMB probes, denial of service, OS fingerprinting etc.

With a large community contribution, snort use rules that describe the traffic that is collected. For snort to be able to analyse traffic properly, it is advised that snort collect traffic from a switch with mirrored port.

Deployment of snort can be complimented with other tools such as snorby which gives an easy to use application that runs on top of snort and sguil which utilizes snort to perform network security monitoring.

TZ-CERT advice everyone running a network and system infrastructure to try Snort if they do not have an Intrusion Detection System in place.

You can learn more about snort in their website www.snort.com

Apple Releases Security Updates for OS X and iTunes

Apple has released updates to OS X and iTunes to address multiple vulnerabilities, some of which could allow an attacker to execute arbitrary code, obtain website credentials, or take control of the affected system.

Updates are available:
1: OS X Mavericks 10.9.3 for OS X Mavericks 10.9 to 10.9.2
2: iTunes 11.2 for Windows 8, 7, Vista, and XP SP3 or later

Users and administrators are encouraged to review Apple Security Updates HT6246 and HT6245, and apply the necessary updates.