Video Screencast Help

Search

Search results

by Jamie Riden It was a bad start to a Monday morning: I arrived at work to find the intrusion detection system so bogged down in alerts that it was barely responsive. Something bad had happened over the weekend. The IDS — in this case, a couple ...
Article by Admin | 03 Dec 2008 | 1 comment
by Abe Getchell This article discusses the process of recovering deleted data from an ext3 partition, on a system running Linux, using a process called data carving. This basic technique is useful in any number of situations, such as recovering ...
Article by Admin | 02 Oct 2008 | 8 comments
by Stephen Barish Wireless networks have long been hailed as easily deployed, low-cost solutions for providing broadband services to an increasingly mobile population. As with any emerging technology, however, it wasn't long before attackers ...
Article by Admin | 25 Aug 2008 | 3 comments
by Timothy M. Mullen When I originally posted to Bugtraq regarding the use of country-by-country sets to control traffic to or from any particular country, I knew that it was not a new idea. However, applying the concept for use with Microsoft's ...
Article by Admin | 15 Jul 2008 | 0 comments
by Don Parker and Ryan Wegner Consider how a preprocessor can be used to introduce learning into our intrusion detection system (IDS). One can use the problem defined in Part I of this article, where the IDS is encouraged to adapt to changes in the ...
Article by Admin | 12 Mar 2008 | 0 comments
by Don Parker and Ryan Wegner The more an intrusion detection system (IDS) knows about the network it is trying to protect, the better it will be able to protect the network. This is the fundamental principle behind target-based intrusion detection, ...
Article by Admin | 05 Mar 2008 | 0 comments
by Jamie Riden and Christian Seifert Honeypots come in many shapes and sizes and are available to mimic lots of different kinds of applications and protocols. We shall take the definition of a honeypot as "a security resource whose value lies in ...
Article by Admin | 14 Feb 2008 | 0 comments