Home > Articles > Security
Security
722 Items
Sort by Date | Title
- Writing Insecure C, Part 3
- Oct 24, 2008
- David Chisnall concludes his series on insecure C code with a discussion of strings, along with some of the more advanced problems that people encounter with C.
|
- Safety First on craigslist
- Oct 22, 2008
- This chapter shows you how to protect yourself when using craigslist.
|
- CCNA Exam 640-553 Exam Cram: Implementing Secure Management and Hardening the Router
- Oct 21, 2008
- This chapter outlines some methods to protect the confidentiality of remote sessions to the router.
|
- Writing Insecure C, Part 2
- Oct 17, 2008
- Continuing his series on insecure C, David Chisnall points out some problems arising from handling of integers and memory in C.
|
- Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
- Oct 15, 2008
- Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
|
- Writing Insecure C, Part 1
- Oct 10, 2008
- David Chisnall takes a look at some of the pitfalls involved in writing secure code in C, with a guided tour of insecure code.
|
- The Truth About Identity Theft: Truth 27 -- ATM Scams
- Oct 2, 2008
- Can someone build a fake ATM to steal your card and pin? The author did. Learn how he constructed a fake ATM and how to protect yourself.
|
- VoIP Threat Taxonomy
- Sep 24, 2008
- This chapter categorizes the main threats against VoIP service and explains their impact and possible methods of protection.
|
- Software [In]security: Getting Past the Bug Parade
- Sep 17, 2008
- Gary McGraw explains why more attention should be paid to finding software flaws through the use of threat modeling and architectural risk analysis.
|
- Security Analysis of a Scan-to-PC Solution
- Sep 12, 2008
- Seth Fogie provides a Security Analysis of "Scan-to-PC" solutions and highlights several security issues that need to be addressed before implementation.
|
- Spam: Unwanted Email from Hell
- Sep 9, 2008
- Andy Walker explains what spam is, where it comes from, and what to do about it.
|
- No Time to Patch
- Sep 5, 2008
- Randy Nash discusses the problems of exploits and malicious code and offers some suggestions to reduce the time to patch these vulnerabilities.
|
- Visual Security Analysis
- Aug 26, 2008
- Raffael Marty shows different ways of analyzing security data using visual approaches.
|
- Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
- Software [In]security: Software Security Demand Rising
- Aug 11, 2008
- Gary McGraw breaks down the numbers from 2007, showing that software security is making headway in the enterprise even against economic headwinds.
|
- Perception of Security Risk: Fear, Uncertainty, and Doubt
- Jul 28, 2008
- Why do so many security product vendors use it as part of the sales pitch? As Randy Nash explains, because it works.
|
- A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
- Jul 21, 2008
- Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
|
- Software [In]security: Application Assessment as a Factory
- Jul 17, 2008
- Gary McGraw explains how creating an application assessment factory can salvage the power of the cost per defect metric while mitigating the potential for its misuse.
|
- The Building Blocks in a Cisco NAC Appliance Design
- Jul 8, 2008
- This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
|
- Security Features on Switches
- Jul 4, 2008
- This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.
|