Video Screencast Help

SecurityFocus

Results for SecurityFocus

by S. G. Masood 1. Introduction The threat of malicious software can easily be considered as the greatest threat to Internet security. Earlier, viruses were, more or less, the only form of malware. Nowadays, the threat has ...
Article by Anonymous | 19 May 2004 | 0 comments
by Don Parker Breaking into the network security industry, and finding a job as a computer security analyst can often be a daunting task. A great deal of us who work in the industry started down this path with nothing but ...
Article by Anonymous | 16 May 2004 | 0 comments
by Jonathan Hassell In the previous two installments [ part 1 , part 2 ] of this article series, as well as in my book Hardening Windows , I've covered the current version of Microsoft's Software Update Services ...
Article by Anonymous | 09 May 2004 | 0 comments
by K. K. Mookhey 1. Introduction The tremendous increase in online transactions has been accompanied by an equal rise in the number and type of attacks against the security of online payment systems. Some of these attacks have ...
Article by Anonymous | 25 Apr 2004 | 2 comments
by Bob Rudis Managing security within the confines of an organization or enterprise is a difficult job. Worms, viruses, spam, malware, port scans and perimeter defense probes are constant threats. Servers and desktop systems require ...
Article by Anonymous | 20 Apr 2004 | 0 comments
by Ravi Iyer 1. Introduction In recent years, IT organizations have endured relentless and increasingly sophisticated attacks to their infrastructure and data. Most of these attacks are launched from the Internet, but ...
Article by Anonymous | 18 Apr 2004 | 0 comments
by Rohyt Belani Understanding the threat In the 1960's, it required the brilliance of Frank Abagnale Jr. (of "Catch Me If You Can" fame) to deceptively build a bank balance of colossal magnitude. Today, all ...
Article by Anonymous | 13 Apr 2004 | 0 comments
by Mariusz Burdach 1. Introduction to part II Last month in the first part of this article series, we discussed some of the preparation and steps that must be taking when analyzing a live Linux system that has been ...
Article by Anonymous | 11 Apr 2004 | 0 comments
by Bob Rudis Introduction In the first part of this article series, we looked a common set of Unix tools to act as an effective spam and virus front-end for Microsoft groupware products, such as Exchange, Notes and ...
Article by Anonymous | 04 Apr 2004 | 0 comments
by Brian Wotring Introduction There are now a number of commercial and open source solutions that can be used to effectively monitor the integrity of host environments. When understood and used correctly, these applications ...
Article by Anonymous | 31 Mar 2004 | 5 comments