Home > Articles > Security > General Security and Privacy

General Security and Privacy

178 Items

Sort by Date | Title

Software [In]security: You Really Need a Software Security Group
Dec 21, 2009
Gary McGraw explains why having a software security group is necessary for a software security initiative.
Spam: Unwanted Email from Hell
Sep 9, 2008
Andy Walker explains what spam is, where it comes from, and what to do about it.
Stateful Web Application Firewalls with .NET
Feb 9, 2007
A Web Application Firewall (WAF), though still evolving, is crucial for strong application layer defense. It is possible to bridge WAF and session objects on the .NET platform to build a stateful WAF (SWAF). Security expert Shreeraj Shah covers the concept, implementation, and deployment of SWAF.
The “Inverse Golden Rule” of Security
Jan 4, 2002
Want to check to see how secure your system and network might be? Ed Tittel tells you how.
The 419 Scam, or Why a Nigerian Prince Wants to Give You Two Million Dollars
Feb 8, 2002
You might be surprised to discover that Americans are bilked out of over one million dollars a day by the Internet scam discussed in this article by Kyle Cassidy.
The Bad Guys from Outside: Malware
Apr 29, 2010
In this chapter, you'll learn how malware works and why it presents such a threat to the enterprise.
The Blown to Bits Interview: Your Life, Liberty, and Happiness After the Digital Explosion
Jun 13, 2008
Blown to Bits authors Hal Abelson, Ken Ledeen, and Harry Lewis talk about privacy and information availability in the digital age.
The Dirty Dozen: The 12 Security Lapses That Make Your .Com, .Org, or .Net an Unwitting Collaborator with Cyberterrorists
Mar 1, 2002
Is your security ultra-tight? If not, your site may be unintentionally colluding in cyberterrorist activity. Frank Fiore and Jean François provide details.
The Enemy: Protecting Your Organization from Blackhats
Oct 12, 2001
This sample chapter from Know Your Enemy shares what the Honeynet Project has learned about blackhats, focusing on those who use existing methods and tools to randomly search for and prey on organizations with highly vulnerable systems.
The Evolution of Evil: Changes in the Use of USB Devices as Delivery Mechanisms for Malicious Code
Oct 7, 2010
USB microcontrollers are small, capable of circumventing most malware detection software, and can deliver devastating payloads. Brad Bowers takes a closer look at this new attack vector and reveals some of the challenges IT security professionals face as the use of microcontrollers as an attack platform matures.
The Foundations of Distributed Message-Level Security
Jun 11, 2004
No Editor
The Future of Identity
Dec 7, 2007
David Chisnall looks at the growing problem of identity theft and wonders whether the Internet can give us some ideas for addressing it.
The Latest Salvo in the Spam Wars Appears in the Blogosphere: nofollow
Jun 24, 2005
There's a new HTML attribute in town called "nofollow" that's supposed to prevent weblog spam. In this article you'll learn about weblog spam, what the "nofollow" tag is, and how it might or might not help the situation.
The Motives of Internet Criminals: Why They Want Our Money
Feb 29, 2008
Understand why — and how — internet criminals work their trade.
The Technical Foundations of Hacking
May 4, 2006
This chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering topics like the Open Systems Interconnect (OSI) system and Transmission Control Protocol/Internet Protocol (TCP/IP). Sample questions with detailed answers from the exam are provided to help you prepare.
TICSA Certification: Information Security Basics
Nov 22, 2002
Master AAA, the cornerstone of security as a systematic discipline. That's access control, authentication, and accounting. Although the details involved in implementing AAA vary from situation to situation, there are consistent basic requirements for all three security principles. Learn them here from Ed Tittel et al.
Tips to Secure Your Home Wi-Fi Network
Jul 10, 2009
Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
Top 10 Social Engineering Tactics
Jun 11, 2009
Andrew Whitaker explains some of these common social engineering tactics used today to gain unauthorized access or acquire confidential information.
Top 4 Software Development Protection Techniques and How to Defeat Them
Dec 7, 2009
Knowing weaknesses in different protection methods can help you choose the best techniques to safeguard your intellectual property.
Top 5 Security Resolutions for New PCs
Jan 28, 2009
Randy Nash discusses common security practices we should all follow when setting up new gear.

<< < Prev Page 5 6 7 8 9 Next >