Help Net Security
United Messaging Deploys Trend Micro Solutions for Its Managed Exchange Service Subscribers
Trend Micro(TM) ScanMail(TM) for Microsoft(R) Exchange 2000 Provides Managed Virus Protection; Secures and Defends Against Security Threats CUPERTINO, Calif and MALVERN, Penn. …
Cogient Corp Clients are Secure through E-Certify’s Secure Web Application Portal
Toronto, ON April 5, 2002 – E-Certify announced today that an agreement has been signed with Cogient Corp., a healthcare application service provider, to supply the …
McAfee.com Acquires Leading Anti-Spam Technology to Attack Fast Growing Internet Problem
‘SpamKiller’ Creator and Anti-Spam Expert to Join Company SUNNYVALE, Calif., April 10 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading provider …
Know Your Enemy: Passive Fingerprinting
This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …
Know Your Enemy: Worms at War
See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …
Know Your Enemy: Motives
This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.
Know Your Enemy: A Forensics Analysis
This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …
Know Your Enemy: III
What happens after the script kiddie gains root. Specifically, how they cover their tracks while they monitor your system. The paper goes through step by step on a system that …
Know Your Enemy: II
How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap. Read the paper in …
Know Your Enemy
The tools and methodology of the most common black-hat threat on the Internet, the Script Kiddie. By understanding how they attack and what they are looking for, you can …
World-Renowned Information Security Expert William H. Murray Joins Trusecure Corporation
Addition Complements Company’s Unparalleled Industry Expertise Herndon, Va.–April 9, 2002– TruSecure® Corporation, a leading managed security services …
McAfee.com to Announce First Quarter 2002 Operating Results
SUNNYVALE, Calif., April 8 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading provider of Web security services today announced it intends to release …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025