Home > Articles > Security > General Security and Privacy

General Security and Privacy

178 Items

Sort by Date | Title

Forming and Managing an Incident Response Team
Mar 22, 2002
This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.
Fuzzing Frameworks
Nov 16, 2007
The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
Gaining Access to Target Systems Using Application and Operating System Attacks
Nov 21, 2007
This sample chapter explores basic and advanced techniques for gaining access by manipulating applications and operating systems.
Game Hacking 101
Nov 21, 2007
Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
Honeynet Project: The Battleground
Nov 2, 2001
This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes the genesis of the Honeynet Project.
Honeynet Project: What a Honeynet Is
Nov 2, 2001
This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes how Honeynet operating systems and applications are identical to real systems, which lets the Honeynet Project group ...
Identity Theft: Criminal Behavior Meets the Information Age
Aug 20, 2004
In our consumer culture/information society, identity is the key to getting credit, which helps with large-ticket purchases such as cars, homes, and a college education. But the free flow of information has made it easier for the seedier side of human nature to show its ugly face, as criminals get sophisticated enough to steal your very person.
Information Gathering: Who Wants to Know What about Whom?
Apr 19, 2002
How much are you willing to pay for convenience? Not just money and time, but information? Two privacy experts help you decide how much information is too much information to give.
Information Security Bookshelf, Part 1 (2009 Edition)
May 8, 2009
Ed Tittel compiles a collection of pointers to useful and informative books on information security.
Information Security Bookshelf, Part 2 (2009 Edition)
May 18, 2009
Ed Tittel compiles a collection of pointers to useful and informative books on information security, part 2 of 2.
Information Security Bookshelf: Part 1 (2011 Edition)
Dec 6, 2010
In this first part of a two-part series on information security books, Ed Tittel compiles a collection of pointers to useful and informative books on information security.
Information Security Bookshelf: Part 2 (2011 Edition)
Dec 13, 2010
In this second part of a two-part series on information security books, Ed Tittel compiles a collection of pointers to useful and informative books on information security.
Installing and Configuring TrueCrypt for Full Disk Encryption
Nov 24, 2008
Security expert Randy Nash describes how he deployed a FDE solution using the free, cross-platform, and open-source solution from TrueCrypt.
Introducing Microsoft ISA Server 2000
May 25, 2001
Microsoft product expert Curt Simmons introduces you to ISA Server, Microsoft's new Internet acceleration and security product.
Is There a Security Problem in Computing?
Dec 29, 2006
This sample chapter examines what kinds of vulnerabilities computing systems are prone to. It then considers why these vulnerabilities are exploited, who is involved, and how to prevent possible attacks on systems.
It’s The End Of The World As We Know It: Why HTML Encoded e-Mail Is A Terrible Idea
Mar 8, 2002
Are you frustrated with HTML-encoded email? The products listed in this article by Kyle Cassidy and Joseph Dries are just a sampling of some of the solutions that are available to protect you and your privacy.
Joy Riders: Mischief That Leads to Mayhem
Oct 30, 2000
Richard Power delves beyond the media hysteria surrounding Internet crime. He provides case studies of several important cybercrimes from the last few years, many of which have surprisingly escaped public notice. This chapter examines three cases of ...
Learn Host-Based Intrusion Detection
Apr 5, 2002
Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.

<< < Prev Page 1 2 3 4 5 Next >