- "Open Sesame" or Not? Use the Right Access Controls
- Apr 12, 2002
- "Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
|
- 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
- 5 Steps to Building and Operating an Effective Security Operations Center (SOC)
- Dec 21, 2015
- Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
|
- A .NET Developer's Guide to Windows Security: Understanding Delegation
- Feb 11, 2005
- This chapter provides the ins and outs of delegation, the process by which a server impersonating a client attempts to use that client's credentials to access remote resources in Kerberos.
|
- A .NET Developer's Guide to Windows Security: Understanding Impersonation
- Feb 18, 2005
- Impersonation is one of the most useful mechanisms in Windows security. It's also fragile and easy to misuse. Careful use of impersonation can lead to a secure, easy-to-administer application. Misuse can open gaping security holes. This sample chapter will help you to use impersonation properly and effectively.
|
- A .NET Developer's Guide to Windows Security: Understanding Ownership
- Feb 25, 2005
- One of the most important components of ACL-based security in Windows is unfortunately also one of the most subtle and overlooked: ownership. Learn about ownership and its importance to security in this sample chapter.
|
- A .NET Developer's Guide to Windows Security: Understanding Protocol Transition
- Mar 4, 2005
- New to Windows Server 2003, Protocol Transition allows you to establish logon sessions with valid Kerberos credentials for an arbitrary domain user without knowing that user's password. This chapter discusses this new tool and its implications for network security.
|
- A .NET Developer's Guide to Windows Security: Understanding User Profiles
- Feb 4, 2005
- Understanding just what user profiles are, and how they interact with the Windows registry system is key to keeping a secure system. Making sure that your programs store settings in the user-specific settings trees, rather than the program directory, will help keep passwords and other vital information secure.
|
- A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
- Jul 21, 2008
- Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
|
- A Comparison of Dial Backup Approaches
- Sep 21, 2001
- This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
|
- A Practical Guide to Trusted Computing: Writing a TPM Device Driver
- Jun 25, 2008
- In this chapter, the authors demonstrate how to talk to a TPM (both 1.1 and 1.2) at the lowest level. This will be useful for programmers who want to talk to the TPM directly, either in BIOS or a device driver.
|
- A Quick and Dirty Introduction to OOP with PHP
- Dec 21, 2001
- Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
|
- A Quick Survey of Remote Desktop Technologies
- Jul 20, 2012
- Tim Warner provides a concise overview of remote desktop technology: what it is, why it is important, what you should be concerned with, and who are the major players in the field.
|
- A Security Review of Protocols: Lower Layers
- May 2, 2003
- As a security-minded system administrator, look at the lower layers, areas of possible dangers, and some basic infrastructure protocols, such as DNS, UDP, SCTP, ARP, TCP/IP, DHCP, IPv6, and WEP.
|
- A Simple Guide To Macintosh Security
- Sep 10, 2004
- Macintosh security is built in, not added as an afterthought. The design of Mac's OS X made security a top priority and achieved it in many different ways. Larry Loeb gives you an update on some of the ways security has been implemented.
|
- A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
- Mar 31, 2006
- Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
|
- Abusing and Misusing Wireless Cameras
- Sep 7, 2007
- Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
|
- Advanced Code Evolution Techniques and Computer Virus Generator Kits
- Mar 25, 2005
- In this chapter you will learn about the advanced self-protection techniques computer virus writers have developed over the years to fight back against scanners. In particular, you will learn about encrypted, oligomorphic, polymorphic, and advanced metamorphic computer viruses. Finally, we will look at computer virus generator kits that use similar techniques to create different-looking virus variants.
|
- Ajay Gupta on Privacy, Security, and Air Conditioning
- Jul 26, 2002
- Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
|
- Alternate Data Streams: Threat or Menace?
- Sep 16, 2005
- By now, you're probably aware of how easy it is to accidentally leave metadata in your Microsoft Word documents, offending or amusing recipients who can easily uncover your mistakes. Did you also know that bad guys might be helping you to even more embarrassment (or danger), by using the alternate data streams (ADS) capability of Windows NTFS to hook warez, pornography, or even hacker's tools to your innocent files?
|