Help Net Security
Microsoft SQL Server Passwords (Cracking the password hashes)
SQL Server uses an undocumented function, pwdencrypt() to produce a hash of the user’s password, which is stored in the sysxlogins table of the master database. This is …
Benjamin Worm Gets a “B” Version
Virus analyzed by: Bogdan Dragu BitDefender Virus Researcher http://www.bitdefender.com Name: Win32.Worm.Benjamin.B Aliases: Worm.Kazaa.Benjamion (KAV) Type: Executable Worm …
RSA Security Embraces SAML Standard Across Product Lines
RSA Security demonstrates SAML functionality with RSA ClearTrust® software at the Burton Group Catalyst Conference in San Francisco on July 15 BEDFORD, Mass., July 9, 2002 — …
GFI Launches Email Exploit Engine – New Technology To Block Email Threats
A revolutionary way of protecting networks against current and future email attacks London, UK, 10 July 2002 – GFI MailSecurity for Exchange/SMTP, GFI’s new email …
McAfee.com Reaches Two Million Subscription Milestone
New SecurityCenter and Product Momentum Credited With Boosting Subscriptions SUNNYVALE, Calif., July 10 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading …
Rainbow Ships NetSwift iGate Web Security Appliance for Instant Private Webs
First Integrated Security Solution for Secure Access to Web-enabled Applications Without Reconfiguring Backend Servers, Firewalls or Mission-Critical Applications IRVINE, …
Major U.S. bank deploying Datakey’s new Card Management System
MINNEAPOLIS, July 9, 2002 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a trusted developer of smart card solutions for securing enterprise-wide personal …
Security in Open versus Closed Systems – The Dance of Boltzmann, Coase and Moore
Some members of the open-source and free software community argue that their code is more secure, because vulnerabilities are easier for users to find and fix. Meanwhile the …
Panda Software: Klez.I Leads the Top Ten List
In June and for the third month running, Klez.I tops the list of the most virulent malicious code, compiled from the results of the free online virus scanner, Panda …
Etap Author Tells Us The Score
I am The Mental Driller, member of the 29A virus-writing group. My reason for writing is that I wish to deny publicly that the virus ‘Simile’, or …
Creating Arbitrary Shellcode In Unicode Expanded Strings
The paper is intended to be read by the portion of the security community responsible for creating protective mechanisms to guard against “shellcode” type security …
Check Point Software’s SmartDefense Named ‘Hot Pick’ by Information Security Magazine
Monthly ‘Hot Pick’ Column Spotlights Standout Security Products REDWOOD CITY, Calif. – July 3, 2002 – Check Point Software Technologies Ltd. (NASDAQ: …
Featured news
Resources
Don't miss
- Cutting through CVE noise with real-world threat signals
- Attackers are turning Salesforce trust into their biggest weapon
- Cloudflare confirms data breach linked to Salesloft Drift supply chain compromise
- BruteForceAI: Free AI-powered login brute force tool
- How gaming experience can help with a cybersecurity career