Video Screencast Help

Search

Search results

by Naresh Verma, Yih Huang, and Arun Sood The information technology revolution has changed the way business is transacted, governments operate, and national defense is conducted. Protection of these systems is essential and continuous efforts to ...
Article by Admin | 07 Nov 2007 | 0 comments
by Rohit Sethi Aspect-oriented programming (AOP) is a paradigm that is quickly gaining traction in the development world. At least partially spurred by the popularity of the Java Spring framework [1], people are beginning to understand the ...
Article by Admin | 15 Oct 2007 | 2 comments
by Stephen Barish In sports, it's pretty much accepted wisdom that home teams have the advantage; that's why teams with winning records on the road do so well in the playoffs. But for some reason we rarely think about "the home field ...
Article by Anonymous | 27 Sep 2007 | 0 comments
by Nicolas Falliere This paper classifies and presents several anti-debugging techniques used on Windows NT-based operating systems. Anti-debugging techniques are ways for a program to detect if it runs under control of a debugger. They are used by ...
Article by Anonymous | 11 Sep 2007 | 2 comments
by Jason Ostrom, John Kindervag “You can’t access our corporate data network from the IP Phones." Testing Protection Controls on a VoIP Network – A Case Study and Method The Business Risk Convergence - the ...
Article by Anonymous | 09 Sep 2007 | 0 comments
by Jamie Riden The problem of sensitive data being leaked through the re-use of storage media is by now well-documented. This is unfortunately a reasonably common occurrence, as shown by various stories of sensitive media being lost or sold ( [1] ...
Article by Anonymous | 25 Jun 2007 | 0 comments
by Jamie Morris Introduction In part one of this series [ ref 1 ] we looked at the different editions of Vista available and discussed the various encryption and backup features which might be of interest to forensic examiners. In this ...
Article by Anonymous | 12 Apr 2007 | 0 comments
by Jamie Morris Introduction While the fundamental principles of computer forensics remain largely unchallenged, the landscape upon which investigators operate is constantly changing. A combination of new technologies and changing habits ...
Article by Anonymous | 08 Mar 2007 | 0 comments
by Rohit Sethi and Nish Bhalla Introduction This article examines the dismal state of application-layer logging as observed from the authors’ years of experience in performing source code security analysis on millions of lines of code. It argues ...
Article by Anonymous | 26 Feb 2007 | 10 comments
by Tony Bradley, CISSP-ISSAP This article takes a look at the Windows Integrity Control (WIC) capabilities in Windows Vista by examining how it protects objects such as files and folders on Vista computers, the different levels of protection offered, ...
Article by Anonymous | 02 Feb 2007 | 0 comments