Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Fuzzing Frameworks
Nov 16, 2007
The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
Preparing for a FISMA Security Audit
Nov 16, 2007
How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
Are Your Passwords Strong Enough? Advice from a Software Tester
Nov 9, 2007
Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
Managing Users and Security in openSUSE Linux
Nov 2, 2007
Michael McCallister shows how to sett up user accounts and create and manage groups that work together.
Virtual Lock Picking of Windows Mobile Password Managers
Nov 2, 2007
Seth Fogie illustrates just how easy it can be for an attacker to "pick open" the security measures used to protect your sensitive data.
Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
Inside Mobile-spy "Spouseware," Part 2
Oct 19, 2007
Seth Fogie tries to hijack Mobile-spy for Windows Mobile phones to make it more malicious.
Inside Mobile-spy "Spouseware," Part 1
Oct 12, 2007
Seth Fogie examines a "spouseware" program to see how it performs its eavesdropping functions.
Information as a Weapon of Mass Destruction
Oct 5, 2007
pdp (architect) discusses just a few of the many disciplines that largely involve information as a tool to spread false beliefs and fears.
Cyber Warfare: Reality or Box Office Hit?
Sep 28, 2007
Randy Nash searches for a working definition of cyber warfare, looks at the historical profile of attacks, and discusses the potential of a devastating electronic Pearl Harbor.
ID Theft: Before and After
Sep 21, 2007
Learn how to protect yourself from identity theft.
Owning the Wireless Camera (and Its User)
Sep 14, 2007
Seth Fogie takes a second look at the web interface of the AXIS 207W network camera.
Abusing and Misusing Wireless Cameras
Sep 7, 2007
Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
Introduction to Network-Based Intrusion Detection Systems
By William Stallings
Aug 24, 2007
Bill Stallings examines network intrusion detection systems.
Identity 2.0: How Attackers Break into Identity-centric Services
Aug 17, 2007
pdp reveals the dangers of user-centric management systems.
Talk Is Cheap: Why the Security Industry Needs to Improve Its Bedside Manner
Aug 17, 2007
Michael Kemp explores an often-overlooked aspect of security practice, namely communicating with clients so that they can be assured of expertise instead of being awed by it.
Computer Security and Statistical Databases
By William Stallings
Aug 17, 2007
Bill Stallings looks at the unique security issues that relate to statistical databases.
Role-Based Access Control in Computer Security
By William Stallings
Aug 10, 2007
Bill Stallings explains the principles of role-based access control.
Technical Advances Make Your Passwords Practically Worthless
Jun 1, 2007
Passwords are supposed to be kept secret, but due to continuing advances in technology, they are becoming weaker every day. Randy Nash outlines the dangers facing passwords and suggests some additional measures needed to protect even ordinary digital assets.
Is Your Agency Failing FISMA?
May 18, 2007
Is your agency failing to meet its FISMA requirements? Randy Nash provides an introduction and general overview to the Federal Information Security Management Act (FISMA) and the Certification and Accreditation (C&A) process and examines why many organizations have trouble complying.

<< < Prev Page 9 10 11 12 13 Next >