- Transparency in Ajax Applications
- Feb 15, 2008
- Billy Hoffman and Bryan Sullivan explain why it's in your best interest to keep as much business logic as possible on the server.
|
- Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1
- May 19, 2008
- Seth Fogie takes an exploratory look at the XO to see what’s inside and provides a few pointers for preparing it for "enhancement."
|
- Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2
- May 26, 2008
- Seth Fogie steers beyond mere enhancements and shows how to turn the OLPC XO into a hacker’s toolkit.
|
- Understanding Denial of Service
- Aug 12, 2005
- Denial of Service (DoS) attacks aren't quite like other malicious network traffic. Instead of gaining some benefit, the perpetrator of a DoS attack seeks only to do harm. This chapter explains the hows, whys, and whos of DoS attacks, and what you can do about them.
|
- Understanding the New A+ Security Objectives
- Jan 6, 2010
- Mark Edward Soper provides a useful overview of the new Security objectives in both of the A+ Certification exams.
|
- Understanding Windows CardSpace: Hints Toward a Solution
- Feb 15, 2008
- Empower Windows users to be first-class citizens of the Identity Metasystem.
|
- Unwitting Collaborators, Part 2: Identity Theft and Impersonation
- Jun 28, 2002
- An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
|
- Using JAAS Authentication with JBoss
- Jun 17, 2005
- This article shows you how to connect to an EJB application running in JBoss from a non-servlet client. And in doing so, Marcus Zarra debunks several JAAS myths. It's much easier to use than you thought!
|
- Vanish: Email that Disappears After Sending - A Review
- Oct 1, 2009
- Technology expert A. Lizard offers a how-to on Vanish, software the makes your files disappear forever.
|
- Viruses and Worms
- Feb 8, 2002
- This sample chapter explains what viruses and worms really are (and aren't), summarizes the means of limiting their impact, and includes pointers to further information.
|
- Visual Security Analysis
- Aug 26, 2008
- Raffael Marty shows different ways of analyzing security data using visual approaches.
|
- Visualization: How to Present Security Data to Get Your Point Across
- Dec 21, 2007
- Learn how to present security data in a style that truly gets your point across.
|
- Web Services and Contemporary SOA (Part II: Advanced Messaging, Metadata, and Security)
- Aug 5, 2005
- This chapter examines the relationships between the SOAP messaging framework and the various WS-* extensions in service-oriented architecture and the features that SOAP enables.
|
- What Is Surreptitious Software?
- Aug 11, 2009
- Christian Collberg and Jasvir Nagra discuss the basic techniques used to protect secrets stored in software.
|
- What's New in Cisco PIX Firewall 7.0
-
By
David Hucaby
- Jun 10, 2005
- The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
|
- Wherever You Go, There They Are: The Perils of Cross-Site Tracking
- Jan 23, 2009
- Greg Conti examines the practice of cross-site tracking and offers ways to block, or at least minimize, it.
|
- XSS, Cookies, and Session ID Authentication – Three Ingredients for a Successful Hack
- Aug 11, 2006
- Seth Fogie looks at a real-life XSS attack and how it was used to bypass the authentication scheme of an online web application, leading to "shell" access to the web server.
|
- Yesterday, Today and Tomorrow: The Story of Scams
- Feb 1, 2008
- Steven Weisman discusses how even smart well-informed people can sometimes get caught in scams.
|