截屏视频帮助
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

SecurityFocus

排序依据:

Results for SecurityFocus

by Stephen Barish We all remember the early days of intrusion-detection systems — IDS was supposed to be the silver bullet that ensured the security of our enterprises against every conceivable attack. It was the same premise that the firewall ...
文章 作者 Admin | 31 3 月 2009 | 0 条评论
by Jamie Riden It was a bad start to a Monday morning: I arrived at work to find the intrusion detection system so bogged down in alerts that it was barely responsive. Something bad had happened over the weekend. The IDS — in this case, a couple ...
文章 作者 Admin | 02 12 月 2008 | 1 条评论
by Abe Getchell This article discusses the process of recovering deleted data from an ext3 partition, on a system running Linux, using a process called data carving. This basic technique is useful in any number of situations, such as recovering ...
文章 作者 Admin | 02 10 月 2008 | 8 条评论
by Stephen Barish Wireless networks have long been hailed as easily deployed, low-cost solutions for providing broadband services to an increasingly mobile population. As with any emerging technology, however, it wasn't long before attackers ...
文章 作者 Admin | 25 8 月 2008 | 3 条评论
by Timothy M. Mullen When I originally posted to Bugtraq regarding the use of country-by-country sets to control traffic to or from any particular country, I knew that it was not a new idea. However, applying the concept for use with Microsoft's ...
文章 作者 Admin | 15 7 月 2008 | 0 条评论
by Don Parker and Ryan Wegner Consider how a preprocessor can be used to introduce learning into our intrusion detection system (IDS). One can use the problem defined in Part I of this article, where the IDS is encouraged to adapt to changes in the ...
文章 作者 Admin | 11 3 月 2008 | 0 条评论
by Don Parker and Ryan Wegner The more an intrusion detection system (IDS) knows about the network it is trying to protect, the better it will be able to protect the network. This is the fundamental principle behind target-based intrusion detection, ...
文章 作者 Admin | 04 3 月 2008 | 0 条评论
by Jamie Riden and Christian Seifert Honeypots come in many shapes and sizes and are available to mimic lots of different kinds of applications and protocols. We shall take the definition of a honeypot as "a security resource whose value lies in ...
文章 作者 Admin | 13 2 月 2008 | 0 条评论
by Naresh Verma, Yih Huang, and Arun Sood The information technology revolution has changed the way business is transacted, governments operate, and national defense is conducted. Protection of these systems is essential and continuous efforts to ...
文章 作者 Admin | 06 11 月 2007 | 0 条评论
by Rohit Sethi Aspect-oriented programming (AOP) is a paradigm that is quickly gaining traction in the development world. At least partially spurred by the popularity of the Java Spring framework [1], people are beginning to understand the ...
文章 作者 Admin | 15 10 月 2007 | 2 条评论