- Game Hacking 101
- Nov 21, 2007
- Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
|
- General Design Considerations for Secure Networks
- Jun 18, 2004
|
- Getting Familiar with Cisco Secure Access Control Server
- Dec 3, 2004
- This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
|
- Getting Owned: The USB Keystroke Injection Attack
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
|
- Getting Started with the Cisco PIX Firewall
- Apr 11, 2003
|
- Getting the Most from Microsoft Window's Encrypted File System
- Aug 12, 2005
- Built into Windows 2000, 2003, and XP is a clever system for easy encryption of files and folders. The Encrypted File System (EFS) is fast, free, and easy to use. Rick Cook's rapid-fire overview of EFS covers how it works, what it does, what it doesn’t do, and what you need to know to make the best use of EFS to protect your precious data.
|
- Getting Your Check Point Firewall-1 Certifications
- Dec 28, 2001
- Dameon Welch Abernathy (Phoneboy) tells you how to tackle two certifications in Check Point FireWall-1: the CCSA and CCSE.
|
- Going on the Defensive: Intrusion-Detection Systems
- Oct 4, 2002
- Tighten your defenses against IDS attacks by learning about the inherent weaknesses in intrusion-detection systems. Cyrus Peikari and Seth Fogie show you how to more safely implement this technology by first showing you how to attack it.
|
- Google Hacking Mini-Guide
- May 7, 2004
- Using search engines such as Google, "search engine hackers" can easily find exploitable targets and sensitive data. This article outlines some of the techniques used by hackers and discusses how to prevent your site from becoming a victim of this form of information leakage.
|
- Got Sender ID?
- Aug 6, 2004
- Everyone is sick of spam, particularly overburdened IT managers who have to deal with it on a day-to-day basis. The Sender ID initiative could ease the burden on administrators, users, company resources, and Internet infrastructure.
|
- Guidelines for Building a Secure IT Infrastructure
- Jan 25, 2002
- Michael Hawkins provides a set of guidelines for building a secure information technology infrastructure.
|
- Hack Your Vacuum Cleaner
- Dec 23, 2003
- Enough with this serious business stuff. Wendy Wolfson explains creative ways to make your robotic vacuum cleaner do anything besides clean the floor.
|
- High-Tech Crimes Revealed: An Interview with Stephen Branigan
- Oct 22, 2004
- Stephen Branigan, one of the founders of the New York City task force on cybercrime and author of High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front, talks to Seth Fogie about hacker motivations and how to solve cyber crimes.
|
- Home Network Router Security Secrets
- Apr 7, 2006
- Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
|
- Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
- Jul 1, 2005
- In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
|
- Home Security and Surveillance Systems
- Jan 16, 2004
- This chapter provides the information you will need to know as a home integrator or a do-it-yourselfer for designing, integrating, and installing a home security and surveillance system.
|
- Honeynet Project: The Battleground
- Nov 2, 2001
- This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes the genesis of the Honeynet Project.
|
- Honeynet Project: What a Honeynet Is
- Nov 2, 2001
- This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes how Honeynet operating systems and applications are identical to real systems, which lets the Honeynet Project group ...
|
- Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
- Jul 1, 2005
- Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
|
- How and Why Hackers Want to Get Inside Your Machine
- Dec 9, 2005
- No Editor
|