- EAP Authentication Protocols for WLANs
- Feb 18, 2005
- This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
|
- Ed Skoudis' Favorite Computer Books
- Apr 25, 2003
- Find out what books are sitting on renowned SANS security lecturer Ed Skoudis' bookshelf.
|
- Effective Incident Response: The Puzzle in Action
- Feb 27, 2004
- This chapter focuses on the operational aspects of computer incident response. The authors describe considerations that should be given to specific incident-handling procedures. This information can then be used to write computer incident policies and procedures.
|
- EFS Issues in Windows XP/2003
- Jun 25, 2004
- Compared to Windows 2000, the new implementation of the Encrypting File System (EFS) in Windows XP/2003 has some pitfalls. Zubair Alexander examines these issues and provides some pointers for planning an EFS strategy for your business environment.
|
- Email Security Policies
- Feb 1, 2002
- The insecure nature of email requires special policy considerations. From archiving to content guidelines, organizations have much to consider when writing email policies.
|
- Emerging Trends in RFID
- Feb 11, 2005
- This chapter takes stock of where RFID technology stands today, discusses the recent innovations around RFID, and examines key factors that will influence its evolution.
|
- Encrypting E-Mail Data
- Aug 27, 2001
- The GNU Privacy Guard's quick-and-dirty encryption capabilities have made it an international success with many popular e-mail clients. In this article, Aron Hsiao teaches you how to use this tool for encrypting e-mail.
|
- Encryption 101: Keys, Algorithms and You
- Feb 15, 2011
- Mike Chapple shows how to protect confidential information via encryption, and teaches the basics when it comes to selecting an encryption technology.
|
- Endpoint Security: What's Missing?
- Nov 30, 2007
- Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
|
- Enterprise Java Security Fundamentals
- Apr 30, 2004
- The J2EE security model addresses authentication, authorization, delegation, and data integrity for the components that make up a J2EE environment. This environment includes J2EE applications—Web components, such as servlets and JSP files, EJB components, Java 2 connectors, and JavaMail—and secure interoperability requirements. If all that sounds like buzzword bingo to you, then this sample book chapter will help you grasp the essentials.
|
- Evaluating Your Firewall
- Feb 11, 2005
- John Traenkenschuh considers some of the basic problems confronting firewall administrators. What's the point of having a firewall, if it can't keep intruders out? And what are some of the business and networking issues that cause firewalls to fail at their duty?
|
- Even Nastier: Traditional RootKits
- Sep 28, 2001
- When attackers get root access on a machine, a RootKit allows them to maintain that access by implementing a back door and hiding evidence of system compromise. Ed Skoudis shows how to avoid being RootKitted in this article.
|
- Everyday Eavesdropping: How Pervasive Is Digital Big Brother?
- May 29, 2008
- Digital eavesdropping will either become far more pervasive or will be reined in to protect civil liberties. Which do we want?
|
- Exploiting phpMyadmin: How to Get root in 15 Easy Steps
- Nov 20, 2009
- Security expert Seth Fogie provides you with a real-world illustration of a how a simple overlooked account can lead to root access.
|
- Exploring ISA Server 2004 Tools and Concepts
- Aug 26, 2005
- This chapter covers the high-level details of each portion of the ISA Management Console, with emphasis placed on introducing ISA administrators to the tools available to make their lives easier.
|
- Expressing Security Protocol Goals
- Sep 26, 2003
- This chapter considers how authentication and secrecy properties can be captured by enhancing CSP descriptions of protocols with the introduction of "specification events" into the descriptions of honest agents.
|
- Failures of Information Security: Observing the World and Asking Why
- Apr 28, 2008
- Andrew Stewart and Adam Shostack delve into some of the most apparent failures of information security.
|
- Fighting Fire with Fire: Designing a "Good" Computer Virus
- Oct 15, 2004
- Cyrus Peikari demonstrates methods to design and test a live, attenuated computer virus vaccine using real-world simulation.
|
- Fighting Spam and Viruses at the Server, Part I
- Mar 12, 2004
- Spam, spam, spam entertaining for Monty Python fans, but not for Internet users. How can E-mail administrators keep it out of the company mailboxes? Dee-Ann LeBlanc and Robert LeBlanc have some useful suggestions.
|
- Fighting Spam and Viruses at the Server, Part II
- Mar 26, 2004
- In their continuing series on spam fighting for the network administrator, Dee-Ann and Robert LeBlanc discuss the tests you perform on an E-mail message's actual content—or, more precisely, the tests that specially designed software performs for you.
|