- Dial Backup for IPSec Tunnels
- Sep 21, 2001
- Network availability in a VPN environment can be significantly enhanced through support of redundant communications links, either in the form of VPNs through other ISPs or, as discussed in this article, via dial backup.
|
- Digital Cryptography: A Subtle Art
- Aug 30, 2002
- Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
|
- Dissecting Snort
- Sep 12, 2003
- Learn the function of the internal components of Snort to help you customize the system to your network and help you avoid some of the common Snort pitfalls.
|
- Donald Pipkin's Security Tips for the Week of December 16th
- Dec 13, 2002
- Take a tip from Don Pipkin, HP security expert and author of "Halting the Hacker: A Practical Guide to Computer Security".
|
- Donald Pipkin's Security Tips for the Week of December 23rd
- Dec 20, 2002
- Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
|
- Donald Pipkin's Security Tips for the Week of December 2nd
- Nov 29, 2002
- Systems and network managers — combat potentially costly security threats with advice from HP security expert Don Pipkin.
|
- Donald Pipkin's Security Tips for the Week of December 9th
- Dec 6, 2002
- See the big picture with security expert Don Pipkin, and weigh the risks and benefits to develop the most sensible security for your organization.
|
- Donald Pipkin's Security Tips for the Week of November 25th
- Nov 22, 2002
- Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
|
- DoS Attacks! How to Protect Your Windows 2003 Server
- Mar 4, 2005
- As long as there are TCP/IP packet transmissions, those pesky DoS (denial of service) attacks are here to stay. You'd better understand how these attacks happen and learn to harden your Windows 2003 Server against them. Jesse Smith gives you information and encouragement.
|
- EAP Authentication Protocols for WLANs
- Feb 18, 2005
- This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
|
- Ed Skoudis' Favorite Computer Books
- Apr 25, 2003
- Find out what books are sitting on renowned SANS security lecturer Ed Skoudis' bookshelf.
|
- Effective Incident Response: The Puzzle in Action
- Feb 27, 2004
- This chapter focuses on the operational aspects of computer incident response. The authors describe considerations that should be given to specific incident-handling procedures. This information can then be used to write computer incident policies and procedures.
|
- EFS Issues in Windows XP/2003
- Jun 25, 2004
- Compared to Windows 2000, the new implementation of the Encrypting File System (EFS) in Windows XP/2003 has some pitfalls. Zubair Alexander examines these issues and provides some pointers for planning an EFS strategy for your business environment.
|
- Email Security Policies
- Feb 1, 2002
- The insecure nature of email requires special policy considerations. From archiving to content guidelines, organizations have much to consider when writing email policies.
|
- Emerging Trends in RFID
- Feb 11, 2005
- This chapter takes stock of where RFID technology stands today, discusses the recent innovations around RFID, and examines key factors that will influence its evolution.
|
- Encrypting E-Mail Data
- Aug 27, 2001
- The GNU Privacy Guard's quick-and-dirty encryption capabilities have made it an international success with many popular e-mail clients. In this article, Aron Hsiao teaches you how to use this tool for encrypting e-mail.
|
- Encryption 101: Keys, Algorithms and You
- Feb 15, 2011
- Mike Chapple shows how to protect confidential information via encryption, and teaches the basics when it comes to selecting an encryption technology.
|
- Endpoint Security: What's Missing?
- Nov 30, 2007
- Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
|
- Enterprise Java Security Fundamentals
- Apr 30, 2004
- The J2EE security model addresses authentication, authorization, delegation, and data integrity for the components that make up a J2EE environment. This environment includes J2EE applications—Web components, such as servlets and JSP files, EJB components, Java 2 connectors, and JavaMail—and secure interoperability requirements. If all that sounds like buzzword bingo to you, then this sample book chapter will help you grasp the essentials.
|
- Evaluating Your Firewall
- Feb 11, 2005
- John Traenkenschuh considers some of the basic problems confronting firewall administrators. What's the point of having a firewall, if it can't keep intruders out? And what are some of the business and networking issues that cause firewalls to fail at their duty?
|