- The Latest Salvo in the Spam Wars Appears in the Blogosphere: nofollow
- Jun 24, 2005
- There's a new HTML attribute in town called "nofollow" that's supposed to prevent weblog spam. In this article you'll learn about weblog spam, what the "nofollow" tag is, and how it might or might not help the situation.
|
- Using JAAS Authentication with JBoss
- Jun 17, 2005
- This article shows you how to connect to an EJB application running in JBoss from a non-servlet client. And in doing so, Marcus Zarra debunks several JAAS myths. It's much easier to use than you thought!
|
- Building a Custom JBoss Login Module
- Jun 10, 2005
- JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
|
- What's New in Cisco PIX Firewall 7.0
-
By
David Hucaby
- Jun 10, 2005
- The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
|
- Developing Secure Applications Through Aspect-Oriented Programming
- Nov 18, 2004
- This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
|
- Identity Theft: Criminal Behavior Meets the Information Age
- Aug 20, 2004
- In our consumer culture/information society, identity is the key to getting credit, which helps with large-ticket purchases such as cars, homes, and a college education. But the free flow of information has made it easier for the seedier side of human nature to show its ugly face, as criminals get sophisticated enough to steal your very person.
|
- Security Considerations for Website Developers
- Aug 20, 2004
- With so many web hosts to choose from, how do you find one that stands up to your security needs? Get the lowdown on how to find a reputable site with the right operating system and user permissions, and learn how SSL and CA certificate security should factor into your decision.
|
- Covert Java: Obfuscating Classes
- Jul 30, 2004
- Obfuscation can help prevent the hacking of your Java code, but how does it work? Alex Kalinovsky explains the most common methods and how they can help protect your intellectual property in this chapter.
|
- A Closer Look at the Fine Print in Privacy Statements
- Jun 11, 2004
- Most major companies (Novell, IBM, Oracle, HP, Microsoft, and so on) have very similar privacy statements. Zubair Alexander takes a closer look at the fine print in these statements: what type of data or personal information may be collected from you, and who it's shared with. What's in the fine print may surprise you.
|
- The Foundations of Distributed Message-Level Security
- Jun 11, 2004
- No Editor
|
- Design Principles for Security Mechanisms
- Jan 10, 2003
- See the power in simplicity and restriction through these eight principles for the design and implementation of security mechanisms.
|
- TICSA Certification: Information Security Basics
- Nov 22, 2002
- Master AAA, the cornerstone of security as a systematic discipline. That's access control, authentication, and accounting. Although the details involved in implementing AAA vary from situation to situation, there are consistent basic requirements for all three security principles. Learn them here from Ed Tittel et al.
|
- Unwitting Collaborators, Part 2: Identity Theft and Impersonation
- Jun 28, 2002
- An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
|
- Information Gathering: Who Wants to Know What about Whom?
- Apr 19, 2002
- How much are you willing to pay for convenience? Not just money and time, but information? Two privacy experts help you decide how much information is too much information to give.
|
- "Open Sesame" or Not? Use the Right Access Controls
- Apr 12, 2002
- "Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
|
- Privacy Organizations and Initiatives
- Apr 12, 2002
- Find out how some organizations are fighting to protect your right to privacy, even as technology becomes steadily more invasive.
|
- Learn Host-Based Intrusion Detection
- Apr 5, 2002
- Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
|
- Night of the Living Wi-Fi's (A Security Parable for Our Times)
- Apr 5, 2002
- Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
|
- See What Your Attacker Sees with Scanning Tools
- Apr 5, 2002
- Defend against attacks by examining your systems from the viewpoint of the attacker. You can use the same tools to protect your systems that attackers use to break in to your systems. Learn how here.
|
- Forming and Managing an Incident Response Team
- Mar 22, 2002
- This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.
|