Home > Articles > Security > General Security and Privacy

General Security and Privacy

178 Items

Sort by Date | Title

Security Through Penetration Testing: Wrap Up
Mar 22, 2002
This sample chapter describes some ways to keep current on the latest tools and techniques in security.
Security Through Penetration Testing: Internet Penetration
Mar 15, 2002
The overall methodology for penetration testing includes discovering as much as possible about the target, identifying all potential avenues of attack, and attempting to compromise the network by leveraging the results of the vulnerability analysis and following as many avenues identified as time allows.
It’s The End Of The World As We Know It: Why HTML Encoded e-Mail Is A Terrible Idea
Mar 8, 2002
Are you frustrated with HTML-encoded email? The products listed in this article by Kyle Cassidy and Joseph Dries are just a sampling of some of the solutions that are available to protect you and your privacy.
The Dirty Dozen: The 12 Security Lapses That Make Your .Com, .Org, or .Net an Unwitting Collaborator with Cyberterrorists
Mar 1, 2002
Is your security ultra-tight? If not, your site may be unintentionally colluding in cyberterrorist activity. Frank Fiore and Jean François provide details.
The 419 Scam, or Why a Nigerian Prince Wants to Give You Two Million Dollars
Feb 8, 2002
You might be surprised to discover that Americans are bilked out of over one million dollars a day by the Internet scam discussed in this article by Kyle Cassidy.
Viruses and Worms
Feb 8, 2002
This sample chapter explains what viruses and worms really are (and aren't), summarizes the means of limiting their impact, and includes pointers to further information.
The “Inverse Golden Rule” of Security
Jan 4, 2002
Want to check to see how secure your system and network might be? Ed Tittel tells you how.
Computer Forensics: Tracking an Offender
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Building a Roadmap for Securing Your Enterprise
Nov 16, 2001
This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
Security's "Top 10"
Nov 16, 2001
Want your systems and networks to be safe and secure? Ed Tittel explains how to stay on top of the constantly changing security landscape.
Musings on Personal (and SOHO) Firewalls
Nov 2, 2001
Want to keep your cable modem or DSL connection safe and secure? Ed Tittel gives you the low-down.
Honeynet Project: The Battleground
Nov 2, 2001
This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes the genesis of the Honeynet Project.
Honeynet Project: What a Honeynet Is
Nov 2, 2001
This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes how Honeynet operating systems and applications are identical to real systems, which lets the Honeynet Project group ...
The Enemy: Protecting Your Organization from Blackhats
Oct 12, 2001
This sample chapter from Know Your Enemy shares what the Honeynet Project has learned about blackhats, focusing on those who use existing methods and tools to randomly search for and prey on organizations with highly vulnerable systems.
Protecting Web Sites by Guarding the Exits
Jun 22, 2001
Security expert Avi Rubin suggests we protect web servers the way some department stores protect against shoplifters: Watch the exits.
Security Considerations for Remote Electronic Voting over the Internet
Jun 22, 2001
Many U.S. citizens think electronic voting will solve our tabulation trials. But can we guarantee an accurate result?
Introducing Microsoft ISA Server 2000
May 25, 2001
Microsoft product expert Curt Simmons introduces you to ISA Server, Microsoft's new Internet acceleration and security product.
Joy Riders: Mischief That Leads to Mayhem
Oct 30, 2000
Richard Power delves beyond the media hysteria surrounding Internet crime. He provides case studies of several important cybercrimes from the last few years, many of which have surprisingly escaped public notice. This chapter examines three cases of ...

<< < Prev Page 5 6 7 8 9