Video Screencast Help

SecurityFocus

Results for SecurityFocus

by Piotr Bania Introduction This article has been written to show that is possible to write shellcode for Windows operating systems that doesn't use standard API calls at all. Of course, as with every solution, this approach has both ...
Article by Anonymous | 03 Aug 2005 | 1 comment
by Yiming Gong With the emergence of Napster in the fall of 1999, peer to peer (P2P) applications and their user base have grown rapidly in the Internet community. With the popularity of P2P and the bandwidth it consume, there is a growing need to ...
Article by Anonymous | 20 Jul 2005 | 0 comments
by Paul Asadoorian IPAudit is a handy tool that will allow you to analyze all packets entering and leaving your network. It listens to a network device in promiscuous mode, just as an IDS sensor would, and provides details on hosts, ports, and ...
Article by Anonymous | 10 Jul 2005 | 1 comment
by Piotr Bania This short article describes the so-called Entry-Point Obscuring (EPO) virus coding technique, primarily through a direct analysis of the Win32.CTX.Phage virus. The reader should know the basics of IA-32 assembly and the main elements ...
Article by Anonymous | 28 Jun 2005 | 0 comments
by Israel G. Lugo, Don Parker In http://www.securityfocus.com/infocus/1839 "> part one of this article series we looked at how a personal firewall actually works and where it taps into the network stack to do its filtering. In part two ...
Article by Anonymous | 19 Jun 2005 | 1 comment
by Israel G. Lugo, Don Parker The concept of a firewall still brings to mind the picture of an impenetrable brick wall, the unsurpassable magic protector of all that is good. The bold statements made by today's security vendors only emphasize ...
Article by Anonymous | 07 Jun 2005 | 1 comment
by Dr. Steven Furnell, Dr. Jeremy Ward It is now twenty years since Fred Cohen published his seminal research paper suggesting the potential threat of computer viruses. [ ref 1 ] In the years since this publication, the risk that Cohen described ...
Article by Anonymous | 31 May 2005 | 0 comments
by Marek Bialoglowy In part 1 of this article, we introducted Bluetooth and some of its security and privacy issues, including how it is detected and some implementation issues from various mobile phone vendors. Now in part 2 we ...
Article by Anonymous | 25 May 2005 | 0 comments
by Andre Lue-Fook-Sang 1.0 Introduction Do most people ever worry about the security of their Intrusion Detection System (IDS)? They should. With high speed Internet access being so common around the world, many personal PCs ...
Article by Anonymous | 17 May 2005 | 0 comments
by Keith J. Jones, Rohyt Belani Reviewing part one Welcome to part two of the Web Browser Forensics series. In part one , we began investigating the intrusion of the Docustodian document management server hosting a law ...
Article by Anonymous | 10 May 2005 | 2 comments