Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

SecurityFocus

Results for SecurityFocus

by Stephen Barish We all remember the early days of intrusion-detection systems — IDS was supposed to be the silver bullet that ensured the security of our enterprises against every conceivable attack. It was the same premise that the firewall ...
Article by Admin | 01 Apr 2009 | 0 comments
by Jamie Riden It was a bad start to a Monday morning: I arrived at work to find the intrusion detection system so bogged down in alerts that it was barely responsive. Something bad had happened over the weekend. The IDS — in this case, a couple ...
Article by Admin | 03 Dec 2008 | 1 comment
by Abe Getchell This article discusses the process of recovering deleted data from an ext3 partition, on a system running Linux, using a process called data carving. This basic technique is useful in any number of situations, such as recovering ...
Article by Admin | 02 Oct 2008 | 8 comments
by Stephen Barish Wireless networks have long been hailed as easily deployed, low-cost solutions for providing broadband services to an increasingly mobile population. As with any emerging technology, however, it wasn't long before attackers ...
Article by Admin | 25 Aug 2008 | 3 comments
by Timothy M. Mullen When I originally posted to Bugtraq regarding the use of country-by-country sets to control traffic to or from any particular country, I knew that it was not a new idea. However, applying the concept for use with Microsoft's ...
Article by Admin | 15 Jul 2008 | 0 comments
by Don Parker and Ryan Wegner Consider how a preprocessor can be used to introduce learning into our intrusion detection system (IDS). One can use the problem defined in Part I of this article, where the IDS is encouraged to adapt to changes in the ...
Article by Admin | 12 Mar 2008 | 0 comments
by Don Parker and Ryan Wegner The more an intrusion detection system (IDS) knows about the network it is trying to protect, the better it will be able to protect the network. This is the fundamental principle behind target-based intrusion detection, ...
Article by Admin | 05 Mar 2008 | 0 comments
by Jamie Riden and Christian Seifert Honeypots come in many shapes and sizes and are available to mimic lots of different kinds of applications and protocols. We shall take the definition of a honeypot as "a security resource whose value lies in ...
Article by Admin | 14 Feb 2008 | 0 comments
by Naresh Verma, Yih Huang, and Arun Sood The information technology revolution has changed the way business is transacted, governments operate, and national defense is conducted. Protection of these systems is essential and continuous efforts to ...
Article by Admin | 07 Nov 2007 | 0 comments
by Rohit Sethi Aspect-oriented programming (AOP) is a paradigm that is quickly gaining traction in the development world. At least partially spurred by the popularity of the Java Spring framework [1], people are beginning to understand the ...
Article by Admin | 15 Oct 2007 | 2 comments