Home > Articles > Security

Security

722 Items

Sort by Date | Title

Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
Details Emerge on the First Windows Mobile Virus (Part 1 of 3)
Sep 3, 2004
This three-part series by Cyrus Peikari, Seth Fogie, and Ratter/29A discusses the development of viruses for the Windows Mobile platform. Part 1 describes the first, WinCE4.Dust.
Details Emerge on the First Windows Mobile Virus (Part 2 of 3)
Sep 10, 2004
In part II we hear from Ratter, the author of the first proof-of-concept virus for Windows Mobile. He begins by tracing the history of how he came into virus research.
Details Emerge on the First Windows Mobile Virus (Part 3 of 3)
Sep 17, 2004
This series concludes with Ratter describing the creation of WinCE4.Dust.
Detecting DDOS and Other Security Problems
Feb 6, 2004
Some developers think the problem of DDOS attacks has no solution, but you can reduce your risk with a unique application of existing technology. John Mueller shows you how you can detect a breach in your application before it becomes a major problem, so at least you can close the door on intruders.
Detecting Signs of Intrusion
Dec 28, 2001
This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
Developing a Continuity-of-Operations Plan
Jul 26, 2002
September 11, 2001 put a whole new spin on "rainy days" and heightened our awareness as to what really needs to be done to prepare for the unexpected. Learn about a methodology for developing an effective continuity-of-operations plan to meet any eventuality.
Developing a Security Policy
Mar 15, 2002
Security policy development is a frequently overlooked component of overall security architectures. This article details the importance of security policies and the basic steps involved in their creation.
Developing Network Security Strategies
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
Developing Secure Applications Through Aspect-Oriented Programming
Nov 18, 2004
This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
Developing Your Information Security Program
Dec 10, 2004
This chapter introduces the core concepts that you should consider when building a new security program or improving an existing one. Both of these tasks require a solid plan and diligent attention to details. Using the methodologies introduced in this chapter, you can begin to create that plan.
Dial Backup for IPSec Tunnels
Sep 21, 2001
Network availability in a VPN environment can be significantly enhanced through support of redundant communications links, either in the form of VPNs through other ISPs or, as discussed in this article, via dial backup.
Digital Cryptography: A Subtle Art
Aug 30, 2002
Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
Dissecting Snort
Sep 12, 2003
Learn the function of the internal components of Snort to help you customize the system to your network and help you avoid some of the common Snort pitfalls.
Donald Pipkin's Security Tips for the Week of December 16th
Dec 13, 2002
Take a tip from Don Pipkin, HP security expert and author of "Halting the Hacker: A Practical Guide to Computer Security".
Donald Pipkin's Security Tips for the Week of December 23rd
Dec 20, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
Donald Pipkin's Security Tips for the Week of December 2nd
Nov 29, 2002
Systems and network managers — combat potentially costly security threats with advice from HP security expert Don Pipkin.
Donald Pipkin's Security Tips for the Week of December 9th
Dec 6, 2002
See the big picture with security expert Don Pipkin, and weigh the risks and benefits to develop the most sensible security for your organization.
Donald Pipkin's Security Tips for the Week of November 25th
Nov 22, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
DoS Attacks! How to Protect Your Windows 2003 Server
Mar 4, 2005
As long as there are TCP/IP packet transmissions, those pesky DoS (denial of service) attacks are here to stay. You'd better understand how these attacks happen and learn to harden your Windows 2003 Server against them. Jesse Smith gives you information and encouragement.

<< < Prev Page 7 8 9 10 11 Next >