Home > Articles > Security > General Security and Privacy

General Security and Privacy

178 Items

Sort by Date | Title

The Latest Salvo in the Spam Wars Appears in the Blogosphere: nofollow
Jun 24, 2005
There's a new HTML attribute in town called "nofollow" that's supposed to prevent weblog spam. In this article you'll learn about weblog spam, what the "nofollow" tag is, and how it might or might not help the situation.
Using JAAS Authentication with JBoss
Jun 17, 2005
This article shows you how to connect to an EJB application running in JBoss from a non-servlet client. And in doing so, Marcus Zarra debunks several JAAS myths. It's much easier to use than you thought!
Building a Custom JBoss Login Module
Jun 10, 2005
JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
What's New in Cisco PIX Firewall 7.0
By David Hucaby
Jun 10, 2005
The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
Developing Secure Applications Through Aspect-Oriented Programming
Nov 18, 2004
This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
Identity Theft: Criminal Behavior Meets the Information Age
Aug 20, 2004
In our consumer culture/information society, identity is the key to getting credit, which helps with large-ticket purchases such as cars, homes, and a college education. But the free flow of information has made it easier for the seedier side of human nature to show its ugly face, as criminals get sophisticated enough to steal your very person.
Security Considerations for Website Developers
Aug 20, 2004
With so many web hosts to choose from, how do you find one that stands up to your security needs? Get the lowdown on how to find a reputable site with the right operating system and user permissions, and learn how SSL and CA certificate security should factor into your decision.
Covert Java: Obfuscating Classes
Jul 30, 2004
Obfuscation can help prevent the hacking of your Java code, but how does it work? Alex Kalinovsky explains the most common methods and how they can help protect your intellectual property in this chapter.
A Closer Look at the Fine Print in Privacy Statements
Jun 11, 2004
Most major companies (Novell, IBM, Oracle, HP, Microsoft, and so on) have very similar privacy statements. Zubair Alexander takes a closer look at the fine print in these statements: what type of data or personal information may be collected from you, and who it's shared with. What's in the fine print may surprise you.
The Foundations of Distributed Message-Level Security
Jun 11, 2004
No Editor
Design Principles for Security Mechanisms
Jan 10, 2003
See the power in simplicity and restriction through these eight principles for the design and implementation of security mechanisms.
TICSA Certification: Information Security Basics
Nov 22, 2002
Master AAA, the cornerstone of security as a systematic discipline. That's access control, authentication, and accounting. Although the details involved in implementing AAA vary from situation to situation, there are consistent basic requirements for all three security principles. Learn them here from Ed Tittel et al.
Unwitting Collaborators, Part 2: Identity Theft and Impersonation
Jun 28, 2002
An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
Information Gathering: Who Wants to Know What about Whom?
Apr 19, 2002
How much are you willing to pay for convenience? Not just money and time, but information? Two privacy experts help you decide how much information is too much information to give.
"Open Sesame" or Not? Use the Right Access Controls
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
Privacy Organizations and Initiatives
Apr 12, 2002
Find out how some organizations are fighting to protect your right to privacy, even as technology becomes steadily more invasive.
Learn Host-Based Intrusion Detection
Apr 5, 2002
Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
Night of the Living Wi-Fi's (A Security Parable for Our Times)
Apr 5, 2002
Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
See What Your Attacker Sees with Scanning Tools
Apr 5, 2002
Defend against attacks by examining your systems from the viewpoint of the attacker. You can use the same tools to protect your systems that attackers use to break in to your systems. Learn how here.
Forming and Managing an Incident Response Team
Mar 22, 2002
This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.

<< < Prev Page 5 6 7 8 9 Next >