Home > Articles > Security > Network Security
Network Security
663 Items
Sort by Date | Title
- Fuzzing Frameworks
- Nov 16, 2007
- The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
|
- Preparing for a FISMA Security Audit
- Nov 16, 2007
- How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
|
- Are Your Passwords Strong Enough? Advice from a Software Tester
- Nov 9, 2007
- Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
|
- Managing Users and Security in openSUSE Linux
- Nov 2, 2007
- Michael McCallister shows how to sett up user accounts and create and manage groups that work together.
|
- Virtual Lock Picking of Windows Mobile Password Managers
- Nov 2, 2007
- Seth Fogie illustrates just how easy it can be for an attacker to "pick open" the security measures used to protect your sensitive data.
|
- Desktop Search Tools - A Security Investigator's New Best Friend
- Oct 26, 2007
- John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
|
- Inside Mobile-spy "Spouseware," Part 2
- Oct 19, 2007
- Seth Fogie tries to hijack Mobile-spy for Windows Mobile phones to make it more malicious.
|
- Inside Mobile-spy "Spouseware," Part 1
- Oct 12, 2007
- Seth Fogie examines a "spouseware" program to see how it performs its eavesdropping functions.
|
- Information as a Weapon of Mass Destruction
- Oct 5, 2007
- pdp (architect) discusses just a few of the many disciplines that largely involve information as a tool to spread false beliefs and fears.
|
- Cyber Warfare: Reality or Box Office Hit?
- Sep 28, 2007
- Randy Nash searches for a working definition of cyber warfare, looks at the historical profile of attacks, and discusses the potential of a devastating electronic Pearl Harbor.
|
- ID Theft: Before and After
- Sep 21, 2007
- Learn how to protect yourself from identity theft.
|
- Owning the Wireless Camera (and Its User)
- Sep 14, 2007
- Seth Fogie takes a second look at the web interface of the AXIS 207W network camera.
|
- Abusing and Misusing Wireless Cameras
- Sep 7, 2007
- Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
|
- Introduction to Network-Based Intrusion Detection Systems
-
By
William Stallings
- Aug 24, 2007
- Bill Stallings examines network intrusion detection systems.
|
- Identity 2.0: How Attackers Break into Identity-centric Services
- Aug 17, 2007
- pdp reveals the dangers of user-centric management systems.
|
- Talk Is Cheap: Why the Security Industry Needs to Improve Its Bedside Manner
- Aug 17, 2007
- Michael Kemp explores an often-overlooked aspect of security practice, namely communicating with clients so that they can be assured of expertise instead of being awed by it.
|
- Computer Security and Statistical Databases
-
By
William Stallings
- Aug 17, 2007
- Bill Stallings looks at the unique security issues that relate to statistical databases.
|
- Role-Based Access Control in Computer Security
-
By
William Stallings
- Aug 10, 2007
- Bill Stallings explains the principles of role-based access control.
|
- Technical Advances Make Your Passwords Practically Worthless
- Jun 1, 2007
- Passwords are supposed to be kept secret, but due to continuing advances in technology, they are becoming weaker every day. Randy Nash outlines the dangers facing passwords and suggests some additional measures needed to protect even ordinary digital assets.
|
- Is Your Agency Failing FISMA?
- May 18, 2007
- Is your agency failing to meet its FISMA requirements? Randy Nash provides an introduction and general overview to the Federal Information Security Management Act (FISMA) and the Certification and Accreditation (C&A) process and examines why many organizations have trouble complying.
|