Please turn on your JavaScript for this page to function normally.
mod_security 1.7 Apache Module Released

Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. It is an open source intrusion detection and …

Is Your Site Being Hacked Without Your Knowledge?

Hackers manage to successfully break into systems much more often than you might realise. Just ask any member of a penetration testing team. These people hack for a living, …

RSA Security Supports Microsoft Security Initiatives

RSA Security offered support for Microsoft Corp.’s newly announced enhanced security initiatives, including a commitment to continued product development and industry …

Interview with Jamie Cameron, author of “Managing Linux Systems with Webmin”

Who is Jamie Cameron? Introduce yourself to our readers. I’m Australian, 29 years old, and have been interested in or working with computers and programming since I got …

Life in the Fast Lane: Security for Cable Modem, DSL, and Other Remote User Internet Connections

Threats To Remote User Network Connections An exciting array of modern broadband technologies, including cable modem, Digital Subscriber Line (DSL), VSAT satellite, and …

Simplifying Data Protection Decisions

No one doubts that computers have made businesses more fast-paced, efficient and flexible. The clerks of Dickens’ day, laboriously entering facts and figures into …

Interview with Jason Reid, author of “Secure Shell in the Enterprise”

Jason Reid is a Member of Technical Staff with Sun Microsystems. There he tests software and writes for the Sun BluePrints program. His start in security began as a Unix …

Blind SQL Injection: Are You Vulnerable?

SQL Injection can deliver total control of your server to an attacker giving them the ability to read, write and manipulate all data stored in your backend systems. Despite …

Exploiting the MSRPC Heap Overflow – Part I

This little documentary chronicles the last moments of another beautiful moth, stuck somewhere between the two live electrical cords of security and freedom. In particular, …

Freeing the Shackles with Secure Remote Working

We all hanker for the opportunity to work less hours and avoid wasting time traveling to and from work. If you counted up the average commute of two hours a day you could claw …

Know Your Enemy: Sebek2 – A kernel based data capture tool

To observe intruders using session encryption, researchers needed to find a way to break the session encryption. For many organizations this has proven extremely difficult. In …

Creating Trustworthy Archives

The efficient and secure storage of business records is fundamental to the insurance industry. Since its conception, organisations and individuals providing insurance services …

Don't miss

Cybersecurity news