Please turn on your JavaScript for this page to function normally.
Know Your Enemy: Worms at War

See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …

Know Your Enemy: Motives

This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.

Know Your Enemy: A Forensics Analysis

This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …

Know Your Enemy: III

What happens after the script kiddie gains root. Specifically, how they cover their tracks while they monitor your system. The paper goes through step by step on a system that …

Know Your Enemy: II

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap. Read the paper in …

Know Your Enemy

The tools and methodology of the most common black-hat threat on the Internet, the Script Kiddie. By understanding how they attack and what they are looking for, you can …

World-Renowned Information Security Expert William H. Murray Joins Trusecure Corporation

Addition Complements Company’s Unparalleled Industry Expertise Herndon, Va.–April 9, 2002– TruSecureĀ® Corporation, a leading managed security services …

McAfee.com to Announce First Quarter 2002 Operating Results

SUNNYVALE, Calif., April 8 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading provider of Web security services today announced it intends to release …

A guide to System V Init

So here we go again. After you have exorcised all of the daemons that were haunting your system, you might be interested in all of the boring processes that occur when booting …

Suid programs, getting to the root of the problem

There are always some little touches left to make your linux even a bit more secure, involving suid, nouser, sudo and etc. Now, this article is newbie friendly, but it also …

Cuna Mutual Group Selects Trusecure As One Of Only Three Preferred Partners

Credit Union Members To Benefit from Heightened Information Security HERNDON, Va.–April 8, 2002–TruSecure(R) Corporation, a leading managed security services …

Application Security, Inc. Releases AppDetective for Lotus Domino

Lotus Domino Discovery, Penetration Testing, and Vulnerability Assessment Scanner NEW YORK, NY – Application Security, Inc. (www.appsecinc.com) announces the …

Don't miss

Cybersecurity news