iKey for Windows 2000 USB security token

Rainbow eSecurity a division of Rainbow Technologies, Inc. developed a new offering in their iKey 2032 USB security token series – iKey for Windows 2000. The new product …

Red Hat 7.3 has been released

Red Hat, Inc. released Red Hat Linux version 7.3, a highly configurable OS designed for deployments ranging from games and personal productivity to file, print and web …

Upcoming security conferences in 2002

Conference: 14th Annual Computer Security Incident Handling Conference (FIRST 2002) Date: June 24-28, 2002 Place: Hilton Waikoloa Village, Hawaii URL: …

Remote Timing Techniques

This paper describes remote timing techniques based on TCP/IP intrinsic operation and options. The techniques are used for careful observation of the TCP/IP data stream to …

Know Your Enemy: Honeynets

This paper focuses on what a Honeynet is, its value to the security community, how it works, and the risks/issues involved. This paper has been updated to include GenI, GenII, …

Know Your Enemy: Passive Fingerprinting

This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …

Know Your Enemy: Worms at War

See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …