Home > Articles > Security > General Security and Privacy

General Security and Privacy

178 Items

Sort by Date | Title

Transparency in Ajax Applications
Feb 15, 2008
Billy Hoffman and Bryan Sullivan explain why it's in your best interest to keep as much business logic as possible on the server.
Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1
May 19, 2008
Seth Fogie takes an exploratory look at the XO to see what’s inside and provides a few pointers for preparing it for "enhancement."
Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2
May 26, 2008
Seth Fogie steers beyond mere enhancements and shows how to turn the OLPC XO into a hacker’s toolkit.
Understanding Denial of Service
Aug 12, 2005
Denial of Service (DoS) attacks aren't quite like other malicious network traffic. Instead of gaining some benefit, the perpetrator of a DoS attack seeks only to do harm. This chapter explains the hows, whys, and whos of DoS attacks, and what you can do about them.
Understanding the New A+ Security Objectives
Jan 6, 2010
Mark Edward Soper provides a useful overview of the new Security objectives in both of the A+ Certification exams.
Understanding Windows CardSpace: Hints Toward a Solution
Feb 15, 2008
Empower Windows users to be first-class citizens of the Identity Metasystem.
Unwitting Collaborators, Part 2: Identity Theft and Impersonation
Jun 28, 2002
An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
Using JAAS Authentication with JBoss
Jun 17, 2005
This article shows you how to connect to an EJB application running in JBoss from a non-servlet client. And in doing so, Marcus Zarra debunks several JAAS myths. It's much easier to use than you thought!
Vanish: Email that Disappears After Sending - A Review
Oct 1, 2009
Technology expert A. Lizard offers a how-to on Vanish, software the makes your files disappear forever.
Viruses and Worms
Feb 8, 2002
This sample chapter explains what viruses and worms really are (and aren't), summarizes the means of limiting their impact, and includes pointers to further information.
Visual Security Analysis
Aug 26, 2008
Raffael Marty shows different ways of analyzing security data using visual approaches.
Visualization: How to Present Security Data to Get Your Point Across
Dec 21, 2007
Learn how to present security data in a style that truly gets your point across.
Web Services and Contemporary SOA (Part II: Advanced Messaging, Metadata, and Security)
Aug 5, 2005
This chapter examines the relationships between the SOAP messaging framework and the various WS-* extensions in service-oriented architecture and the features that SOAP enables.
What Is Surreptitious Software?
Aug 11, 2009
Christian Collberg and Jasvir Nagra discuss the basic techniques used to protect secrets stored in software.
What's New in Cisco PIX Firewall 7.0
By David Hucaby
Jun 10, 2005
The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
Wherever You Go, There They Are: The Perils of Cross-Site Tracking
Jan 23, 2009
Greg Conti examines the practice of cross-site tracking and offers ways to block, or at least minimize, it.
XSS, Cookies, and Session ID Authentication – Three Ingredients for a Successful Hack
Aug 11, 2006
Seth Fogie looks at a real-life XSS attack and how it was used to bypass the authentication scheme of an online web application, leading to "shell" access to the web server.
Yesterday, Today and Tomorrow: The Story of Scams
Feb 1, 2008
Steven Weisman discusses how even smart well-informed people can sometimes get caught in scams.

<< < Prev Page 5 6 7 8 9