Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

"Open Sesame" or Not? Use the Right Access Controls
Apr 12, 2002
"Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
May 2, 2011
Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
5 Steps to Building and Operating an Effective Security Operations Center (SOC)
Dec 21, 2015
Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
A .NET Developer's Guide to Windows Security: Understanding Delegation
Feb 11, 2005
This chapter provides the ins and outs of delegation, the process by which a server impersonating a client attempts to use that client's credentials to access remote resources in Kerberos.
A .NET Developer's Guide to Windows Security: Understanding Impersonation
Feb 18, 2005
Impersonation is one of the most useful mechanisms in Windows security. It's also fragile and easy to misuse. Careful use of impersonation can lead to a secure, easy-to-administer application. Misuse can open gaping security holes. This sample chapter will help you to use impersonation properly and effectively.
A .NET Developer's Guide to Windows Security: Understanding Ownership
Feb 25, 2005
One of the most important components of ACL-based security in Windows is unfortunately also one of the most subtle and overlooked: ownership. Learn about ownership and its importance to security in this sample chapter.
A .NET Developer's Guide to Windows Security: Understanding Protocol Transition
Mar 4, 2005
New to Windows Server 2003, Protocol Transition allows you to establish logon sessions with valid Kerberos credentials for an arbitrary domain user without knowing that user's password. This chapter discusses this new tool and its implications for network security.
A .NET Developer's Guide to Windows Security: Understanding User Profiles
Feb 4, 2005
Understanding just what user profiles are, and how they interact with the Windows registry system is key to keeping a secure system. Making sure that your programs store settings in the user-specific settings trees, rather than the program directory, will help keep passwords and other vital information secure.
A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
Jul 21, 2008
Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
A Comparison of Dial Backup Approaches
Sep 21, 2001
This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
A Practical Guide to Trusted Computing: Writing a TPM Device Driver
Jun 25, 2008
In this chapter, the authors demonstrate how to talk to a TPM (both 1.1 and 1.2) at the lowest level. This will be useful for programmers who want to talk to the TPM directly, either in BIOS or a device driver.
A Quick and Dirty Introduction to OOP with PHP
Dec 21, 2001
Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
A Quick Survey of Remote Desktop Technologies
Jul 20, 2012
Tim Warner provides a concise overview of remote desktop technology: what it is, why it is important, what you should be concerned with, and who are the major players in the field.
A Security Review of Protocols: Lower Layers
May 2, 2003
As a security-minded system administrator, look at the lower layers, areas of possible dangers, and some basic infrastructure protocols, such as DNS, UDP, SCTP, ARP, TCP/IP, DHCP, IPv6, and WEP.
A Simple Guide To Macintosh Security
Sep 10, 2004
Macintosh security is built in, not added as an afterthought. The design of Mac's OS X made security a top priority and achieved it in many different ways. Larry Loeb gives you an update on some of the ways security has been implemented.
A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
Mar 31, 2006
Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
Abusing and Misusing Wireless Cameras
Sep 7, 2007
Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
Advanced Code Evolution Techniques and Computer Virus Generator Kits
Mar 25, 2005
In this chapter you will learn about the advanced self-protection techniques computer virus writers have developed over the years to fight back against scanners. In particular, you will learn about encrypted, oligomorphic, polymorphic, and advanced metamorphic computer viruses. Finally, we will look at computer virus generator kits that use similar techniques to create different-looking virus variants.
Ajay Gupta on Privacy, Security, and Air Conditioning
Jul 26, 2002
Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
Alternate Data Streams: Threat or Menace?
Sep 16, 2005
By now, you're probably aware of how easy it is to accidentally leave metadata in your Microsoft Word documents, offending or amusing recipients who can easily uncover your mistakes. Did you also know that bad guys might be helping you to even more embarrassment (or danger), by using the alternate data streams (ADS) capability of Windows NTFS to hook warez, pornography, or even hacker's tools to your innocent files?

Page 1 2 3 4 5 Next >