Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

661 Items

Sort by Date | Title

"Open Sesame" or Not? Use the Right Access Controls
By Julia H. Allen
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
By Brad Bowers
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
5 Steps to Building and Operating an Effective Security Operations Center (SOC)
By Joseph Muniz
Dec 21, 2015
Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
A .NET Developer's Guide to Windows Security: Understanding Delegation
By Keith Brown
Feb 11, 2005
This chapter provides the ins and outs of delegation, the process by which a server impersonating a client attempts to use that client's credentials to access remote resources in Kerberos.
A .NET Developer's Guide to Windows Security: Understanding Impersonation
By Keith Brown
Feb 18, 2005
Impersonation is one of the most useful mechanisms in Windows security. It's also fragile and easy to misuse. Careful use of impersonation can lead to a secure, easy-to-administer application. Misuse can open gaping security holes. This sample chapter will help you to use impersonation properly and effectively.
A .NET Developer's Guide to Windows Security: Understanding Ownership
By Keith Brown
Feb 25, 2005
One of the most important components of ACL-based security in Windows is unfortunately also one of the most subtle and overlooked: ownership. Learn about ownership and its importance to security in this sample chapter.
A .NET Developer's Guide to Windows Security: Understanding Protocol Transition
By Keith Brown
Mar 4, 2005
New to Windows Server 2003, Protocol Transition allows you to establish logon sessions with valid Kerberos credentials for an arbitrary domain user without knowing that user's password. This chapter discusses this new tool and its implications for network security.
A .NET Developer's Guide to Windows Security: Understanding User Profiles
By Keith Brown
Feb 4, 2005
Understanding just what user profiles are, and how they interact with the Windows registry system is key to keeping a secure system. Making sure that your programs store settings in the user-specific settings trees, rather than the program directory, will help keep passwords and other vital information secure.
A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
By Randy Nash
Jul 21, 2008
Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
A Comparison of Dial Backup Approaches
By Vincent C. Jones
Sep 21, 2001
This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
A Practical Guide to Trusted Computing: Writing a TPM Device Driver
By David Challener, Ryan Catherman, David Safford, Leendert Van Doorn, Kent Yoder
Jun 25, 2008
In this chapter, the authors demonstrate how to talk to a TPM (both 1.1 and 1.2) at the lowest level. This will be useful for programmers who want to talk to the TPM directly, either in BIOS or a device driver.
A Quick and Dirty Introduction to OOP with PHP
By Christopher Cosentino
Dec 21, 2001
Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
A Security Review of Protocols: Lower Layers
By Steven M. Bellovin, William R. Cheswick, Aviel D. Rubin
May 2, 2003
As a security-minded system administrator, look at the lower layers, areas of possible dangers, and some basic infrastructure protocols, such as DNS, UDP, SCTP, ARP, TCP/IP, DHCP, IPv6, and WEP.
A Simple Guide To Macintosh Security
By Larry Loeb
Sep 10, 2004
Macintosh security is built in, not added as an afterthought. The design of Mac's OS X made security a top priority and achieved it in many different ways. Larry Loeb gives you an update on some of the ways security has been implemented.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
By Seth Fogie
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
Abusing and Misusing Wireless Cameras
By Seth Fogie
Sep 7, 2007
Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
Advanced Code Evolution Techniques and Computer Virus Generator Kits
By Peter Szor
Mar 25, 2005
In this chapter you will learn about the advanced self-protection techniques computer virus writers have developed over the years to fight back against scanners. In particular, you will learn about encrypted, oligomorphic, polymorphic, and advanced metamorphic computer viruses. Finally, we will look at computer virus generator kits that use similar techniques to create different-looking virus variants.
Ajay Gupta on Privacy, Security, and Air Conditioning
By Ajay Gupta
Jul 26, 2002
Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
Alternate Data Streams: Threat or Menace?
By Rick Cook
Sep 16, 2005
By now, you're probably aware of how easy it is to accidentally leave metadata in your Microsoft Word documents, offending or amusing recipients who can easily uncover your mistakes. Did you also know that bad guys might be helping you to even more embarrassment (or danger), by using the alternate data streams (ADS) capability of Windows NTFS to hook warez, pornography, or even hacker's tools to your innocent files?
An Executive's Information Security Challenge
By Tim Mather, Mark Egan
May 6, 2005
Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.

Page 1 2 3 4 5 Next >