Home > Articles > Security

Security

722 Items

Sort by Date | Title

Fighting Spam and Viruses at the Server, Part IV
Apr 23, 2004
Dee-Ann and Robert LeBlanc conclude their series on weeding out the spam in your users' inboxes with this comprehensive look at the tools and tricks Windows mail administrators can use to get their incoming mail services back under control.
Fighting Spam and Viruses at the Server, Part V: The Linux Edition
May 7, 2004
In the final article in this series about spam management for administrators, Dee-Ann and Robert LeBlanc look at the products available for Linux, and compare the (platform agnostic) tradeoffs between free and commercial solutions.
File System Forensic Analysis: PC-based Partitions
May 12, 2005
This chapter dives into the details of the partition systems used in personal computers from DOS partitions, to Apple partitions, to removable media. Find out how it works in this sample chapter.
Finding You: How Should Geolocation Be Used?
May 30, 2008
With Geolocation, what is possible depends on who has what data, and how well they use it to connect the dots. What is right is harder to say.
Firesheep, Fireshepherd, and Facebook: Understanding Session Hijacking
Feb 22, 2011
Mike Chapple shows you how web authentication makes session hijacking possible, how Firesheep exploits these vulnerabilities, and the measures that website administrators, web developers, and end users can take to protect against session hijacking attacks.
Firewall Deployment for Multi-Tier Applications
Apr 5, 2002
Firewalls can be deployed in numerous ways as part of a security perimeter around Internet-facing servers. Lenny Zeltser explains here how to use firewalls to separate network resources in a way that suits multitier applications.
FISMA: Compliance vs. Security
Apr 14, 2008
Randy Nash asks this question: Does FISMA make our agencies any more secure?
Five Applications to Secure Your Wi-Fi Hotspot Connections
May 13, 2010
Don't risk eavesdroppers capturing your email, passwords, and other sensitive info! Eric Geier reviews five helpful apps that encrypt your wireless traffic.
FlexiSPY Mobile Spyware: Monitoring Solution or Security Nightmare?
Mar 14, 2008
Seth Fogie takes a look at the mobile spyware app FlexiSPY and shows where the mobile malware world could be headed.
For Wireless Security, First Understand Wireless Programming
Feb 14, 2003
One of the steps to mastering wireless security is to first master the basics of wireless programming. Look at the basics of XML, WML, i-mode, Java, and more to get a feel of the industry's programming standards.
Forming an Effective Incident Response Team: What's Your Mission?
Feb 20, 2004
There are numerous considerations that should be addressed during the formation of an incident response team. Then a solid foundation can be laid for the other decisions that must be made toward the completion of the team. The chapter first defines the focus and mission of the team, then moves into various operational aspects that may be considered.
Forming and Managing an Incident Response Team
Mar 22, 2002
This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.
Fun With Check Point Licensing
Dec 28, 2001
This article, derived from Essential Check Point Firewall-1: An Installation, Configuration, and Troubleshooting Guide, tackles one of the more challenging aspects of Check Point FireWall-1: licensing.
Fuzzing Frameworks
Nov 16, 2007
The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
Gaining Access to Target Systems Using Application and Operating System Attacks
Nov 21, 2007
This sample chapter explores basic and advanced techniques for gaining access by manipulating applications and operating systems.
Game Hacking 101
Nov 21, 2007
Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
General Design Considerations for Secure Networks
Jun 18, 2004
Getting Familiar with Cisco Secure Access Control Server
Dec 3, 2004
This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
Getting Owned: The USB Keystroke Injection Attack
Oct 6, 2010
What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
Getting Started with the Cisco PIX Firewall
Apr 11, 2003

<< < Prev Page 9 10 11 12 13 Next >