Please turn on your JavaScript for this page to function normally.
Snort on Window Server 2003

The setup the author is discussing is running Snort 2.3.3 on Windows Server 2003 with PHP5 and SQL 2000 SP4. All other components are also the latest available for public use. …

Security Risks Associated With Portable Storage Devices

It seems that nearly every new electronic device on the market today comes equipped with data storage and transfer capabilities. From USB sticks to smart phones, MP3 players …

Securing Storage: Complete Data Erasure on Storage Systems

Out of sight, out of mind. When storage systems are upgraded, retired due to proactive maintenance, reach the end of their lease, or are repurposed or resold, companies often …

The Key to Compliance

In the wake of the Enron and Worldcom accounting scandals, the regulations an enterprise implements to ensure its integrity are open to increasing scrutiny. This has given …

How well do you know your partner?

For those of you who follow the news, you may have read the recent story of spy software discovered at some of Israel’s leading companies which reads just like the spy …

An Introduction to Securing Linux with Apache, ProFTPd and Samba

While the vast majority of Linux users are hard-core techies, some may be using Linux because they want to try something new, are interested in the technology, or simply …

Gerhard Eschelbeck on the Common Vulnerability Scoring System (CVSS)

Gerhard Eschelbeck is the CTO & Vice President of engineering of Qualys. In this audio Mr. Eschelbeck discusses the Common Vulnerability Scoring System (CVSS), the …

Does Firefox Really Provide More Security Than Internet Explorer?

Introduction Internet Explorer is a graphical web browser made by Microsoft and comes integrated with Windows. Even though it’s by far the most widely used browser, …

Domain Footprinting for Web Applications and Web Services

A wide array of services, from banking and finance transactions to auctions and ticket reservations, are being offered to customers online. This means that an Internet …

Web Application Defense At The Gates – Leveraging IHttpModule

Web applications are vulnerable to many attacks, mainly due to poor input validation at the source code level. Firewalls can block access to ports but once a web application …

Securing Optical Networks With Quantum Cryptography

In a world where the reliance on electronic data transmission and processing is becoming every day more prevalent, it is of critical importance for organizations to guarantee …

Qualys CTO on SANS Top 20 Quaterly Update

More than 600 new Internet security vulnerabilities were discovered during the first quarter of 2005, according to the SANS Institute and a team of experts from industry and …

Don't miss

Cybersecurity news