Home > Articles > Security

Security

722 Items

Sort by Date | Title

EAP Authentication Protocols for WLANs
Feb 18, 2005
This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
Ed Skoudis' Favorite Computer Books
Apr 25, 2003
Find out what books are sitting on renowned SANS security lecturer Ed Skoudis' bookshelf.
Effective Incident Response: The Puzzle in Action
Feb 27, 2004
This chapter focuses on the operational aspects of computer incident response. The authors describe considerations that should be given to specific incident-handling procedures. This information can then be used to write computer incident policies and procedures.
EFS Issues in Windows XP/2003
Jun 25, 2004
Compared to Windows 2000, the new implementation of the Encrypting File System (EFS) in Windows XP/2003 has some pitfalls. Zubair Alexander examines these issues and provides some pointers for planning an EFS strategy for your business environment.
Email Security Policies
Feb 1, 2002
The insecure nature of email requires special policy considerations. From archiving to content guidelines, organizations have much to consider when writing email policies.
Emerging Trends in RFID
Feb 11, 2005
This chapter takes stock of where RFID technology stands today, discusses the recent innovations around RFID, and examines key factors that will influence its evolution.
Encrypting E-Mail Data
Aug 27, 2001
The GNU Privacy Guard's quick-and-dirty encryption capabilities have made it an international success with many popular e-mail clients. In this article, Aron Hsiao teaches you how to use this tool for encrypting e-mail.
Encryption 101: Keys, Algorithms and You
Feb 15, 2011
Mike Chapple shows how to protect confidential information via encryption, and teaches the basics when it comes to selecting an encryption technology.
Endpoint Security: What's Missing?
Nov 30, 2007
Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
Enterprise Java Security Fundamentals
Apr 30, 2004
The J2EE security model addresses authentication, authorization, delegation, and data integrity for the components that make up a J2EE environment. This environment includes J2EE applications—Web components, such as servlets and JSP files, EJB components, Java 2 connectors, and JavaMail—and secure interoperability requirements. If all that sounds like buzzword bingo to you, then this sample book chapter will help you grasp the essentials.
Evaluating Your Firewall
Feb 11, 2005
John Traenkenschuh considers some of the basic problems confronting firewall administrators. What's the point of having a firewall, if it can't keep intruders out? And what are some of the business and networking issues that cause firewalls to fail at their duty?
Even Nastier: Traditional RootKits
Sep 28, 2001
When attackers get root access on a machine, a RootKit allows them to maintain that access by implementing a back door and hiding evidence of system compromise. Ed Skoudis shows how to avoid being RootKitted in this article.
Everyday Eavesdropping: How Pervasive Is Digital Big Brother?
May 29, 2008
Digital eavesdropping will either become far more pervasive or will be reined in to protect civil liberties. Which do we want?
Exploiting phpMyadmin: How to Get root in 15 Easy Steps
Nov 20, 2009
Security expert Seth Fogie provides you with a real-world illustration of a how a simple overlooked account can lead to root access.
Exploring ISA Server 2004 Tools and Concepts
Aug 26, 2005
This chapter covers the high-level details of each portion of the ISA Management Console, with emphasis placed on introducing ISA administrators to the tools available to make their lives easier.
Expressing Security Protocol Goals
Sep 26, 2003
This chapter considers how authentication and secrecy properties can be captured by enhancing CSP descriptions of protocols with the introduction of "specification events" into the descriptions of honest agents.
Failures of Information Security: Observing the World and Asking Why
Apr 28, 2008
Andrew Stewart and Adam Shostack delve into some of the most apparent failures of information security.
Fighting Fire with Fire: Designing a "Good" Computer Virus
Oct 15, 2004
Cyrus Peikari demonstrates methods to design and test a live, attenuated computer virus vaccine using real-world simulation.
Fighting Spam and Viruses at the Server, Part I
Mar 12, 2004
Spam, spam, spam — entertaining for Monty Python fans, but not for Internet users. How can E-mail administrators keep it out of the company mailboxes? Dee-Ann LeBlanc and Robert LeBlanc have some useful suggestions.
Fighting Spam and Viruses at the Server, Part II
Mar 26, 2004
In their continuing series on spam fighting for the network administrator, Dee-Ann and Robert LeBlanc discuss the tests you perform on an E-mail message's actual content—or, more precisely, the tests that specially designed software performs for you.

<< < Prev Page 8 9 10 11 12 Next >