Video Screencast Help

SecurityFocus

Results for SecurityFocus

by Sumit Siddharth, Pratiksha Doshi 1. Introduction "No language can prevent insecure code, although there are language features which could aid or hinder a security-conscious developer." -Chris Shiflett This article looks ...
Article by Anonymous | 02 Nov 2010 | 4 comments
by Bob Rudis On April 11, 2006, as part of Microsoft’s regular "Patch Tuesday," Redmond released MS06-013 , a cumulative security patch for Internet Explorer. The patch fixes ten vulnerabilities, some with active exploits in the wild. It ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Peter Thermos "We are more secure than a regular phone line." VoIP is here to stay. In fact many incumbent telecommunication carriers have started offering VoIP service for sometime and several new VoIP service providers have ...
Article by Anonymous | 02 Nov 2010 | 1 comment
by Don Parker It was almost two years ago now that I wrote the SecurityFocus article on TCP/IP skills required for security analysts . That article offered advice on how one can seek employment in the security field through education, training, ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Sarah Granger The purpose of this article is to go beyond the basics and explore how social engineering, employed as technology, has evolved over the past few years. A case study of a typical Fortune 1000 company will be discussed, putting ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Dragos Ruiu This short article looks at how to get a fully functional IPSec VPN up and running between two fresh OpenBSD installations in about four minutes flat. Until recently, setting up an open-source IPSec solution has been woefully ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Raul Siles, GSE Introduction In part one of this series , we discussed the current Sebek development and its integration with GenIII Honeynets. In this article, we take it a step further and focus on best practices to deploy Sebek inside a ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Thorsten Holz, Frederic Raynal This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Thorsten Holz, Frederic Raynal This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering ...
Article by Anonymous | 02 Nov 2010 | 0 comments
by Raul Siles, GSE Introduction It has become increasingly important for security professionals to deploy new detection mechanisms to track and capture an attacker's activities. Third Generation (GenIII) Honeynets provide all the components ...
Article by Anonymous | 02 Nov 2010 | 0 comments