Home > Articles > Security

Security

722 Items

Sort by Date | Title

Covert Java: Hacking Non-Public Methods and Variables of a Class
Jun 4, 2004
Learn to hack non-public methods and variables of a class. Alex Kalinovsky covers the problem of encapsulation, accessing packages and protected class members, and accessing private class members.
Covert Java: Obfuscating Classes
Jul 30, 2004
Obfuscation can help prevent the hacking of your Java code, but how does it work? Alex Kalinovsky explains the most common methods and how they can help protect your intellectual property in this chapter.
Cracking Wi-Fi Protected Access (WPA), Part 1
Mar 4, 2005
In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
Cracking Wi-Fi Protected Access (WPA), Part 2
Mar 11, 2005
Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
Creating a Secure Development Framework
Aug 27, 2004
Business applications can be weak spots in an otherwise secure network, but in this article, Glyn Geoghegan explains how to keep your applications as secure the rest of your IT infrastructure.
Creating an Information Security Policy
Nov 16, 2001
Scott Barman discusses how to create an information security policy that can be the basis for sound virus protection on your organization's network.
Creating an SSL Keystore Using the Java Keytool
Aug 19, 2005
Many Java application servers and Web servers support the use of keystores for SSL configuration. If you're building secure Java programs, learning to build a keystore is, well, key. Jon Svede shows you how to accomplish it using the Java keytool utility with BEA's WebLogic 8.1.
Creating Custom Policies for the Cisco Security Agent
Jul 14, 2006
Creating your own policies is a major part of operating a successful CSA deployment. To accomplish this, you must thoroughly understand the components available to you and the methods of research available. Understanding the rule types and the events caused by those rules helps you move forward in your deployment and perform day-to-day support. A solid grasp of the fundamentals and advanced components not only makes you an effective administrator but also an efficient one. This chapter will help you get started with this.
Creating Your Own VPN
Oct 23, 2012
Security expert Eric Geier shows you how to set up a VPN to securely access your PC or network when you’re away, and to secure your Internet connection when using Wi-Fi hotspots.
Crime, War, and B.S. in the Electronic Universe
Mar 21, 2008
Michael Kemp warns of a more insidious threat than actual information attacks: pandering to the fear of these attacks.
Cryptography with Java
May 28, 2004
The purpose of this chapter is to make you, a Java and J2EE programmer, feel at home with cryptographic capabilities of Java, and is structured around cryptography information that is both useful and practical to Java programmers.
Cryptography: Beginning with a Simple Communication Game
Nov 5, 2004
In this introductory chapter from his book, Wenbo Mao uses a simple game to demonstrate the complexity of cryptography, and its utility for your business.
CryptoNugget
Feb 23, 2001
Cryptography is a minor hobby of author Richard Heathfield. He has written this article in much the same way that he might have written for his book, C Unleashed, and he hopes you'll find it diverting and send you to the book for more!
Cyber Stalking, Fraud, and Abuse
Feb 1, 2012
This chapter explores what the various major types of internet fraud are, what the law says, and what you can do to protect yourself.
Cyber Warfare: Reality or Box Office Hit?
Sep 28, 2007
Randy Nash searches for a working definition of cyber warfare, looks at the historical profile of attacks, and discusses the potential of a devastating electronic Pearl Harbor.
Cybercrime and Politics: The Dangers of the Internet in Elections
Apr 23, 2008
This chapter focuses on the 2008 presidential election to demonstrate the risks involved in using the Internet in campaigning.
Cyberwar Stories: If He Had Just Paid the Rent
Sep 24, 2004
Steven Branigan demonstrates the principle that investigation of smaller crimes can lead to the discovery of much larger crimes in this case study from his book.
Daily Security Tips from Ed Skoudis - Week of August 19, 2002
Aug 16, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
Daily Security Tips from Ed Skoudis - Week of August 26, 2002
Aug 23, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
Daily Security Tips from Ed Skoudis - Week of February 10, 2003
Feb 7, 2003
Make security part of your daily life — take some advice from one of InformIT's most popular writers, Ed Skoudis.

<< < Prev Page 5 6 7 8 9 Next >