Video Screencast Help

SecurityFocus

Results for SecurityFocus

by Lance Spitzner For the past 18 months we have seen a tremendous growth in honeypot technologies. Everything from OpenSource solutions such as Honeyd and Honeynets, to commercial offerings such as KFSensor are commonly available. ...
Article by Anonymous | 14 Jan 2004 | 0 comments
by Nishchal Bhalla and Rohyt Belani The security posture of a web application can be severely undermined if the underlying web server software is vulnerable. The web server software is the most visible and easy to exploit part of a web ...
Article by Anonymous | 05 Jan 2004 | 0 comments
by Andy Cuff 1.0 Introduction Installing a Network IDS (NIDS) onto a network requires a significant amount of thought and planning. In addition to the technical issues and product selection there are resource issues, from product ...
Article by Anonymous | 30 Dec 2003 | 1 comment
by Harry Anderson 1.0 Introduction Nessus is a vulnerability scanner, a program that looks for security bugs in software. There is a freely available open source version which runs on Unix. Tenable Security has also recently ...
Article by Anonymous | 16 Dec 2003 | 0 comments
by Sarah Granger Finding the right firewall Firewalls play a crucial role in network and computer security.   Part I of this series, Home User Security: Your First Defense , examined the typical functions of firewalls and ...
Article by Anonymous | 08 Dec 2003 | 0 comments
by Mark Wolfgang Access Granted -- Now What? Welcome back! The first article in this two-part series covered a few different methods of getting into the target router. This article will focus on what we can do once we've ...
Article by Anonymous | 01 Dec 2003 | 0 comments
by Laurent Oudot [continued from Part 1 ] Most of the time, a spammer connecting to the open proxy server will try to send an initial email in order to check how the proxy is working. This moment can be crucial if you want to fool ...
Article by Anonymous | 26 Nov 2003 | 0 comments
by Sarah Granger Editor's note: this article has also been translated into German thanks to Vu-Clan , a Deutsch gaming site. The need for a firewall It used to be that an anti-virus program was a home user's ...
Article by Anonymous | 19 Nov 2003 | 1 comment
by Pete Finnigan Continuing from Part One In part one of this short article series we looked at some of the advantages of Oracle's row level security, what it can be used for, and looked at a simple example of how it ...
Article by Anonymous | 17 Nov 2003 | 0 comments
by Secure Science Corporation 1 Overview Not all people that send undesirable email (spam) are the same. Their motives differ as greatly as their tools and technical abilities. This document uncovers a spam gang who seeks to ...
Article by Anonymous | 13 Nov 2003 | 2 comments