Video Screencast Help

SecurityFocus

Results for SecurityFocus

by Khushbu Jithra The flood of recent Microsoft Office vulnerabilities has brought forth the need to understand the mechanics of the MS Office security architecture and the possible fault injection points. This article discusses Microsoft ...
Article by Anonymous | 21 Aug 2006 | 0 comments
by Reji Thomas and Bhasker Reddy This article discusses the shared libraries concept in both Windows and Linux, and offers a walk through various data structures to explain how dynamic linking is done in these operating systems. The paper will be ...
Article by Anonymous | 14 Aug 2006 | 0 comments
by Reji Thomas and Bhasker Reddy This article discusses the shared libraries concept in both Windows and Linux, and offers a walk-through through various data structures to explain how dynamic linking is done in these operating systems. The paper ...
Article by Anonymous | 07 Aug 2006 | 0 comments
by Jamie Riden Introduction As we all know, prevention, detection and response are our three main lines of defence against threats, with a good administrator putting most focus on prevention. As the old adage goes, "an ounce of prevention is ...
Article by Anonymous | 23 Jul 2006 | 0 comments
by Don Parker The purpose of this introductory article is to take a basic look at the journey of a packet across the Internet, from packet creation to switches, routers, NAT, and the packet's traverse across the Internet. This topic is ...
Article by Anonymous | 05 Jul 2006 | 0 comments
by Tony Bradley, CISSP-ISSAP Introduction This article looks at Microsoft's free Strider URL Tracer with Typo-Patrol to help fight typo-squatters and domain parking abuse. The tool can be used to protect children from seeing inappropriate or ...
Article by Anonymous | 26 Jun 2006 | 0 comments
by Jaswinder S. Hayre, CISSP, and Jayasankar Kelath, CISSP Editor's note: Article first published 2006-06-19; updated 2006-06-22. Added several additional references that were mistakenly omitted by the authors, plus a new section on ...
Article by Anonymous | 18 Jun 2006 | 0 comments
by Phil Kostenbader, CISSP, and Bob Donnelly, CISM, CISSP The idea of a common desktop firewall policy in any size organization is a very good thing. It makes responses to external or internal situations such as virus outbreaks or network-oriented ...
Article by Anonymous | 05 Jun 2006 | 0 comments
by Frederic Raynal This two-part article series looks at how cryptography is a double-edged sword: it is used to make us safer, but it is also being used for malicious purposes within sophisticated viruses. Part two continues the discussion of ...
Article by Anonymous | 15 May 2006 | 2 comments
by Frederic Raynal Cryptology is everywhere these days. Most users make good use of it even if they do not know they are using cryptographic primitives from day to day. This two-part article series looks at how cryptography is a double-edged sword: ...
Article by Anonymous | 07 May 2006 | 2 comments