Please turn on your JavaScript for this page to function normally.
Interpreting Network Traffic: A Network Intrusion Detector’s Look At Suspicious Events

The purpose of this paper is to discuss interpretations of selected network traffic events from the viewpoint of a network intrusion detection analyst. I assume the analyst …

Building a Bastion Host Using HP-UX 11

A bastion host is a computer system that is exposed to attack, and may be a critical component in a network security system. Special attention must be paid to these highly …

Network Intrusion Detection of Third Party Effects

The main goal of this paper is to familiarize the reader with reactions and responses from innocent victims, who may be subject to reconnaissance or denial of service. If a …

DNS Security in Australia

Australian Internet security company DeMorgan released a document which is revealing the state of DNS security within Australia. The result – “Of the total number …

Secure Computing’s Sidewinder Firewall Impervious To Critical UNIX Vulnerability

Sidewinder’s Patented Type Enforcement(tm) Architecture Thwarts Complete System Compromise Attack Detailed in CERT® Advisory CERT-2001-21 SAN JOSE, CA, July 31, 2001 …

RSA Security Announces Agreement to Acquire Securant Technologies

Award-Winning ClearTrust Authorization Solution Joins RSA Security’s Market Leading Authentication, PKI and Encryption Products Company to Discuss Transaction in …

A Recurrence of the ‘Code Red’ Worm?

Kaspersky Labs comments on the rumors surrounding the epidemic concerning this menacing Internet worm. At the beginning of this week, press agencies for the US, UK and other …

Time is running out for Businesses to protect themselves against Code Red

MessageLabs, the email security company, is warning businesses who run Microsoft’s Internet Information Server (IIS) web server software that they must protect their …

Computer Associates Urges Renewed Vigilance Against Anticipated July 31 ‘Code Red’ Worm Attack

ISLANDIA, N.Y., July 30 /PRNewswire/ — Computer Associates International, Inc. (CA), is urging personal computer users to take precautions against the anticipated July …

Danger of Code Red Worm Still Lurks. Chilling Wake-Up Call Continues for Internet Security

How to Protect Your Web Server Against Attack SAN JOSE, Calif., July 30 /PRNewswire/ — As Code Red Worm continues its defacement of Internet Web sites worldwide, it has …

Microsoft Advises IIS Administrators on Code Red

The Microsoft Security Response Center, along with other organizations listed below, is jointly publishing this alert that ALL IIS ADMINISTRATORS ARE ASKED TO READ A Very Real …

InfoExpress Launches CyberArmor 2.0 The Latest Standard in Enterprise Personal Firewall Protection

New “policy wizard” lets non-security experts develop custom security policies for their remote users Mountain View, CA — July 30, 2001 — In response …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools