Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Game Hacking 101
Nov 21, 2007
Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
General Design Considerations for Secure Networks
Jun 18, 2004
Getting Familiar with Cisco Secure Access Control Server
Dec 3, 2004
This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
Getting Started with the Cisco PIX Firewall
Apr 11, 2003
Getting the Most from Microsoft Window's Encrypted File System
Aug 12, 2005
Built into Windows 2000, 2003, and XP is a clever system for easy encryption of files and folders. The Encrypted File System (EFS) is fast, free, and easy to use. Rick Cook's rapid-fire overview of EFS covers how it works, what it does, what it doesn’t do, and what you need to know to make the best use of EFS to protect your precious data.
Getting Your Check Point Firewall-1 Certifications
Dec 28, 2001
Dameon Welch Abernathy (Phoneboy) tells you how to tackle two certifications in Check Point FireWall-1: the CCSA and CCSE.
Going on the Defensive: Intrusion-Detection Systems
Oct 4, 2002
Tighten your defenses against IDS attacks by learning about the inherent weaknesses in intrusion-detection systems. Cyrus Peikari and Seth Fogie show you how to more safely implement this technology by first showing you how to attack it.
Google Hacking Mini-Guide
May 7, 2004
Using search engines such as Google, "search engine hackers" can easily find exploitable targets and sensitive data. This article outlines some of the techniques used by hackers and discusses how to prevent your site from becoming a victim of this form of information leakage.
Got Sender ID?
Aug 6, 2004
Everyone is sick of spam, particularly overburdened IT managers who have to deal with it on a day-to-day basis. The Sender ID initiative could ease the burden on administrators, users, company resources, and Internet infrastructure.
Guidelines for Building a Secure IT Infrastructure
Jan 25, 2002
Michael Hawkins provides a set of guidelines for building a secure information technology infrastructure.
Hack Your Vacuum Cleaner
Dec 23, 2003
Enough with this serious business stuff. Wendy Wolfson explains creative ways to make your robotic vacuum cleaner do anything besides clean the floor.
High-Tech Crimes Revealed: An Interview with Stephen Branigan
Oct 22, 2004
Stephen Branigan, one of the founders of the New York City task force on cybercrime and author of High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front, talks to Seth Fogie about hacker motivations and how to solve cyber crimes.
Home Network Router Security Secrets
Apr 7, 2006
Ever delve inside your home network routers and use the hidden security settings that can lock down a network nice and tight? Most people never do. Andy Walker reveals 10 secrets on how to easily access your router's security settings.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
Home Security and Surveillance Systems
Jan 16, 2004
This chapter provides the information you will need to know — as a home integrator or a do-it-yourselfer — for designing, integrating, and installing a home security and surveillance system.
Honeynet Project: The Battleground
Nov 2, 2001
This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes the genesis of the Honeynet Project.
Honeynet Project: What a Honeynet Is
Nov 2, 2001
This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes how Honeynet operating systems and applications are identical to real systems, which lets the Honeynet Project group ...
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
How and Why Hackers Want to Get Inside Your Machine
Dec 9, 2005
No Editor

<< < Prev Page 9 10 11 12 13 Next >