- Ajay Gupta on Privacy, Security, and Air Conditioning
- Jul 26, 2002
- Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
|
- Alternate Data Streams: Threat or Menace?
- Sep 16, 2005
- By now, you're probably aware of how easy it is to accidentally leave metadata in your Microsoft Word documents, offending or amusing recipients who can easily uncover your mistakes. Did you also know that bad guys might be helping you to even more embarrassment (or danger), by using the alternate data streams (ADS) capability of Windows NTFS to hook warez, pornography, or even hacker's tools to your innocent files?
|
- An Executive's Information Security Challenge
- May 6, 2005
- Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.
|
- An Insider's Look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge
- May 15, 2012
- Brad Bowers takes an insider look into the 2012 Mid-Atlantic Collegiate Cyber Defense Challenge that faces off hardened penetration testers against defending college teams in this annual cyber attack and defend competition.
|
- An Introduction to Snort: A Lightweight Intrusion Detection System
- Jun 15, 2001
- In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
|
- An Overview of Computer Security
- Jan 3, 2005
|
- An Overview of Computer Security
- Jan 31, 2003
- Break down computer security into each of its components and see how each one contributes to a vulnerable system or network.
|
- Analyzing MPLS VPN Security
- Oct 6, 2005
- VPN users have certain expectations and requirements for their VPN service. In a nutshell, they want their service to be both private and secure. In other words, they want their VPN to be as secure as with dedicated circuits while gaining the scalability benefits of a shared infrastructure. Both concepts, of privacy and security, are not black and white, and need to be defined for a real world implementation. This chapter introduces you to VPN MPLS security requirements.
|
- Analyzing the Crossover Virus: The First PC to Windows Handheld Cross-infector
- Mar 8, 2006
- "Airborne" mobile viruses have been increasing in complexity at a surprising pace. In this article, Cyrus Peikari analyzes the new Crossover Trojan, which is the first malware that simultaneously infects both Windows PCs and Windows Mobile handheld devices.
|
- Anatomy Of A HackโThe Rise And Fall Of Your Network
- Jul 1, 2005
- There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
|
- Anatomy of an Intrusion Prevention System
- Oct 14, 2005
- Ultimately, security will be embedded within the network fabric, where traffic of all types (e.g., data, voice, video, graphics, fax) is not just routed from source to destination, but delivered with the necessary quality of service, and delivered securely. Intrusion Prevention Systems are the first step in this direction.
|
- Application of Denial of Service Attacks
- Jul 30, 2004
- Denial-of-Service (DoS) attacks can severely damage your business. In this article, Stephen de Vries explains the basics of DoS attacks, and how you can begin to protect yourself from them.
|
- Application Security for Visual C++.NET Developers
- Jul 18, 2003
- It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 1 of 3)
- Mar 16, 2009
- If you're the company's disaster-recovery planner, and you're caught unprepared for a natural disaster, are you at fault?
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
- Mar 23, 2009
- Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
- Mar 31, 2009
- Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
|
- Are You Still Using RSH?
- Jan 30, 2004
- Running RSH is like leaving your house keys under the welcome mat. SSH offers the same convenience and functionality with far greater security, so why haven't you switched?
|
- Are Your Passwords Strong Enough? Advice from a Software Tester
- Nov 9, 2007
- Here's a look at passwords from the perspectives of a software tester, a business analyst, and a user.
|
- art_gore_outsourcing
- Jan 1, 2003
|
- As the Worm Turns: The Stuxnet Legacy
- Mar 14, 2011
- In his ongoing series about the intersections of technology and society, Larry Constantine (an interaction designer specializing in safety-critical applications) discusses the history of the malware known as stuxnet and offers suggestions on how it can be stopped.
|