Home > Articles > Security


RSS Feed Subscribe to this topic  RSS details

722 Items

Sort by Date | Title

Ajay Gupta on Privacy, Security, and Air Conditioning
By Ajay Gupta
Jul 26, 2002
Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
Alternate Data Streams: Threat or Menace?
By Rick Cook
Sep 16, 2005
By now, you're probably aware of how easy it is to accidentally leave metadata in your Microsoft Word documents, offending or amusing recipients who can easily uncover your mistakes. Did you also know that bad guys might be helping you to even more embarrassment (or danger), by using the alternate data streams (ADS) capability of Windows NTFS to hook warez, pornography, or even hacker's tools to your innocent files?
An Executive's Information Security Challenge
By Tim Mather, Mark Egan
May 6, 2005
Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.
An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
By Brad Bowers
May 15, 2012
Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
An Introduction to Security Testing with Open Source Tools
By Michael Kelly
Sep 16, 2005
Michael Kelly reports on handy security uses for four open source tools: WebGoat, Firefox Web Developer, WebScarab, and Ethereal. By combining the tools in easy ways, testers can track down and close the gaping security holes that are often left in applications.
An Introduction to Snort: A Lightweight Intrusion Detection System
By Joseph Dries
Jun 15, 2001
In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
An Overview of Computer Security
By Matt Bishop
Jan 3, 2005
An Overview of Computer Security
By Matt Bishop
Jan 31, 2003
Break down computer security into each of its components and see how each one contributes to a vulnerable system or network.
Analyzing MPLS VPN Security
By Michael H. Behringer, Monique Morrow
Oct 6, 2005
VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
By Cyrus Peikari
Mar 8, 2006
"Airborne" mobile viruses have been increasing in complexity at a surprising pace. In this article, Cyrus Peikari analyzes the new Crossover Trojan, which is the first malware that simultaneously infects both Windows PCs and Windows Mobile handheld devices.
Anatomy Of A Hackโ€”The Rise And Fall Of Your Network
By Steve Riley, Jesper M. Johansson
Jul 1, 2005
There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Anatomy of an Intrusion Prevention System
By Marc Willebeek-LeMair
Oct 14, 2005
Ultimately, security will be embedded within the network fabric, where traffic of all types (e.g., data, voice, video, graphics, fax) is not just routed from source to destination, but delivered with the necessary quality of service, and delivered securely. Intrusion Prevention Systems are the first step in this direction.
Application of Denial of Service Attacks
By Corsaire, Stephen de Vries
Jul 30, 2004
Denial-of-Service (DoS) attacks can severely damage your business. In this article, Stephen de Vries explains the basics of DoS attacks, and how you can begin to protect yourself from them.
Application Security for Visual C++.NET Developers
By John Paul Mueller
Jul 18, 2003
It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 1 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 16, 2009
If you're the company's disaster-recovery planner, and you're caught unprepared for a natural disaster, are you at fault?
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 23, 2009
Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 31, 2009
Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
Are You Still Using RSH?
By Russ Hunter
Jan 30, 2004
Running RSH is like leaving your house keys under the welcome mat. SSH offers the same convenience and functionality with far greater security, so why haven't you switched?
Are Your Passwords Strong Enough? Advice from a Software Tester
By Karen N. Johnson
Nov 9, 2007
Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
By Matthew David
Jan 1, 2003

< Prev Page 1 2 3 4 5 Next >