- "Open Sesame" or Not? Use the Right Access Controls
- Apr 12, 2002
- "Open Sesame" or Not? Administrators must use the correct access controls to ensure a secure system.
|
- 2011 Collegiate Cyber Defense Challenge: Shaping the Cyber Warriors of Tomorrow
- May 2, 2011
- Brad Bowers provides an intriguing look into the 2011 Mid-Atlantic CCDC attack-and-defense competition for information technology students.
|
- 5 Steps to Building and Operating an Effective Security Operations Center (SOC)
- Dec 21, 2015
- Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
|
- A .NET Developer's Guide to Windows Security: Understanding Delegation
- Feb 11, 2005
- This chapter provides the ins and outs of delegation, the process by which a server impersonating a client attempts to use that client's credentials to access remote resources in Kerberos.
|
- A .NET Developer's Guide to Windows Security: Understanding Impersonation
- Feb 18, 2005
- Impersonation is one of the most useful mechanisms in Windows security. It's also fragile and easy to misuse. Careful use of impersonation can lead to a secure, easy-to-administer application. Misuse can open gaping security holes. This sample chapter will help you to use impersonation properly and effectively.
|
- A .NET Developer's Guide to Windows Security: Understanding Ownership
- Feb 25, 2005
- One of the most important components of ACL-based security in Windows is unfortunately also one of the most subtle and overlooked: ownership. Learn about ownership and its importance to security in this sample chapter.
|
- A .NET Developer's Guide to Windows Security: Understanding Protocol Transition
- Mar 4, 2005
- New to Windows Server 2003, Protocol Transition allows you to establish logon sessions with valid Kerberos credentials for an arbitrary domain user without knowing that user's password. This chapter discusses this new tool and its implications for network security.
|
- A .NET Developer's Guide to Windows Security: Understanding User Profiles
- Feb 4, 2005
- Understanding just what user profiles are, and how they interact with the Windows registry system is key to keeping a secure system. Making sure that your programs store settings in the user-specific settings trees, rather than the program directory, will help keep passwords and other vital information secure.
|
- A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
- Jul 21, 2008
- Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
|
- A Closer Look at the Fine Print in Privacy Statements
- Jun 11, 2004
- Most major companies (Novell, IBM, Oracle, HP, Microsoft, and so on) have very similar privacy statements. Zubair Alexander takes a closer look at the fine print in these statements: what type of data or personal information may be collected from you, and who it's shared with. What's in the fine print may surprise you.
|
- A Comparison of Dial Backup Approaches
- Sep 21, 2001
- This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
|
- A Practical Guide to Trusted Computing: Writing a TPM Device Driver
- Jun 25, 2008
- In this chapter, the authors demonstrate how to talk to a TPM (both 1.1 and 1.2) at the lowest level. This will be useful for programmers who want to talk to the TPM directly, either in BIOS or a device driver.
|
- A Quick and Dirty Introduction to OOP with PHP
- Dec 21, 2001
- Most PHP programs are written in the traditional style of programming, but PHP also can accommodate object-oriented programming (OOP), which is preferable when creating large programs. Chris Cosentino shows you here how to use OOP with PHP.
|
- A Quick Survey of Remote Desktop Technologies
- Jul 20, 2012
- Tim Warner provides a concise overview of remote desktop technology: what it is, why it is important, what you should be concerned with, and who are the major players in the field.
|
- A Security Review of Protocols: Lower Layers
- May 2, 2003
- As a security-minded system administrator, look at the lower layers, areas of possible dangers, and some basic infrastructure protocols, such as DNS, UDP, SCTP, ARP, TCP/IP, DHCP, IPv6, and WEP.
|
- A Simple Guide To Macintosh Security
- Sep 10, 2004
- Macintosh security is built in, not added as an afterthought. The design of Mac's OS X made security a top priority and achieved it in many different ways. Larry Loeb gives you an update on some of the ways security has been implemented.
|
- A Student-Hacker Showdown at the Collegiate Cyber Defense Competition
- Mar 31, 2006
- Students-turned-IT managers faced off against experienced hackers at the Mid-Atlantic Regional Collegiate Cyber Defense Competition. Seth Fogie witnessed this real-world competition and reports on its unexpected twists, turns, and even drama.
|
- Abusing and Misusing Wireless Cameras
- Sep 7, 2007
- Security expert Seth Fogie takes a look at exploits relating to a popular wireless surveillance camera.
|
- Advanced Code Evolution Techniques and Computer Virus Generator Kits
- Mar 25, 2005
- In this chapter you will learn about the advanced self-protection techniques computer virus writers have developed over the years to fight back against scanners. In particular, you will learn about encrypted, oligomorphic, polymorphic, and advanced metamorphic computer viruses. Finally, we will look at computer virus generator kits that use similar techniques to create different-looking virus variants.
|
- Advertising and Embedded Content
- Apr 14, 2009
- Greg Conti explores the risks associated with embedded content by focusing on Googleโs advertising network and Google Analytics.
|