Video Screencast Help

SecurityFocus

Results for SecurityFocus

by Pete Finnigan Continuing from Part One In part one of this short article series we looked at some of the advantages of Oracle's row level security, what it can be used for, and looked at a simple example of how it ...
Article by Anonymous | 16 Nov 2003 | 0 comments
by Secure Science Corporation 1 Overview Not all people that send undesirable email (spam) are the same. Their motives differ as greatly as their tools and technical abilities. This document uncovers a spam gang who seeks to ...
Article by Anonymous | 12 Nov 2003 | 2 comments
by Pete Finnigan In this short paper I want to explore the rather interesting row level security feature added to Oracle 8i and above, starting with version 8.1.5. This functionality has been described as fine grained access control ...
Article by Anonymous | 06 Nov 2003 | 0 comments
by Jamil Farshchi Introduction Threats to wireless local area networks (WLANs) are numerous and potentially devastating. Security issues ranging from misconfigured wireless access points (WAPs) to session hijacking to Denial of ...
Article by Anonymous | 04 Nov 2003 | 0 comments
by Harry Anderson 1.0 Introduction Nessus is a great tool designed to automate the testing and discovery of known security problems. Typically someone, a hacker group, a security company, or a researcher discovers a specific way ...
Article by Anonymous | 27 Oct 2003 | 1 comment
by Laurent Oudot Summer 2003 will sadly remain famous for netsurfers because of the propagation of an Internet worm known as MSBlast, which infected millions of hosts running Microsoft Windows. This event is far from unique; other worms ...
Article by Anonymous | 22 Oct 2003 | 0 comments
by Ivan Ristic As more and more attacks are being carried out over the HTTP layer there is a growing need to push the envelope and bring Web security to new levels. Most existing tools work on the TCP/IP level, failing to use the specifics ...
Article by Anonymous | 20 Oct 2003 | 1 comment
by Holt Sorenson This is the second article in a three part series on tools that are useful during incident response and investigation after a compromise has occurred on a Linux, OpenBSD, or Solaris system. The first article focused ...
Article by Anonymous | 16 Oct 2003 | 0 comments
by Matthew Tanase Introduction There are many tools we use as network and security professionals to build a secure network. Routers, virtual private networks, intrusion detection systems and vulnerability scanners are regularly ...
Article by Anonymous | 14 Oct 2003 | 2 comments
by Marcia Wilson From the outside in Bringing business to the Web is in and of itself risky business, just through the act of taking data from the inside network to the outside network. Data that was once protected by routers and ...
Article by Anonymous | 06 Oct 2003 | 0 comments