Can you trust your computer?

Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted …

DBCC SHOWTABLEAFFINITY buffer overrun

Martin Rakhmanoff wrote this article to (better) document the process of finding and exploiting buffer overrun bugs. Provided sample code is written for Microsoft SQL Server …

ICSA Labs announces Q3 2002 certifications

ICSA Labs, an independent division of TruSecure Corporation announced that it has certified sixteen products in Q3 2002. George Japak, vice president of ICSA Labs said: …

InfoSecU enterprise licensing announced

Pittsburgh based, privately owned security company RedSiren Technologies, announced enterprise licensing for their online information security training courses Security …

Interview with Saumil Shah, Security Researcher

Saumil Shah is a security researcher and is one of the authors of Web Hacking: Attacks and Defense. How did you gain interest in computer security? My interest in computer …

PGP 8.0 Public Beta available for download

During the RSA Conference 2002 Europe in Paris we had another opportunity to talk with Jon Callas, Chief Technical and Chief Security Officer at newly founded PGP Corporation. …

Scope on Attix5 secure backuping software

Attix5, UK based secure backup expert, recently announced the availability of Backup Professional Server Edition, a secure online backup system for corporations that need …