Video Screencast Help

SecurityFocus

Results for SecurityFocus

by James Butler, Sherri Sparks The third and final article in this series explores five different rootkit detection techniques used to discover Windows rootkit deployments. Additionally, nine different tools designed for administrators are discussed. ...
Article by Anonymous | 05 Jan 2006 | 0 comments
by Abhishek Singh, CISSP Demystifying Denial-Of-Service attacks, part one By Abhishek Singh, CISSP This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from ...
Article by Anonymous | 14 Dec 2005 | 2 comments
by Sumit Siddharth Published 2005-12-02; updated 2005-12-06 citing additional credits to two researchers. In this article we look at some of the most popular IDS evasion attack techniques. We start by looking at attacks that are based ...
Article by Anonymous | 06 Dec 2005 | 0 comments
by James Butler, Sherri Sparks 1. Introduction In our previous article , we discussed current rootkit development techniques. In this article, we take it a step further and focus upon upcoming, cutting edge trends in rootkit technologies. Then ...
Article by Anonymous | 17 Nov 2005 | 0 comments
by James Butler, Sherri Sparks In 2005, the bar has been raised in the arena of malicious software. This has never before been more evident than in the recent deployments of Windows rootkit technology within some of the latest viruses, worms, ...
Article by Anonymous | 04 Nov 2005 | 0 comments
by Ivan Arce, Eduardo Arias Protecting endpoint systems such as desktop computers and servers is an important part of any reasonably well-thought security strategy for both enterprise networks and home computers. The outbreak of devastating worms and ...
Article by Anonymous | 24 Oct 2005 | 1 comment
by Mark Squire Security companies and researchers have made careers out of identifying the latest bugs in Internet Explorer. While Microsoft has been relatively idle, the developers of Firefox have continued to add functionality and provide what was ...
Article by Anonymous | 03 Oct 2005 | 1 comment
by Mati Aharoni, William M. Hidalgo Introduction Throughout our education as system administrators, SNMP is often a topic that eludes us. One might have a vague understanding of what it's used for, and a general sense of security around some ...
Article by Anonymous | 15 Sep 2005 | 0 comments
by Nicolas Falliere Windows heap overflows have become increasingly popular over the last couple of years. Papers like, "Third Generation Exploitation" [ ref 1 ] or, "Windows Heap Overflows" [ ref 2 ] introduced the internal ...
Article by Anonymous | 31 Aug 2005 | 0 comments
by Don Parker, Mike Sues Most of us who work in the security world have at one time or another looked at the raw output of a firewall, IDS, or other type of security device. What that output invariably leads one to is viewing packets directly for an ...
Article by Anonymous | 15 Aug 2005 | 0 comments