Please turn on your JavaScript for this page to function normally.
Exploiting the MSRPC Heap Overflow – Part I

This little documentary chronicles the last moments of another beautiful moth, stuck somewhere between the two live electrical cords of security and freedom. In particular, …

Freeing the Shackles with Secure Remote Working

We all hanker for the opportunity to work less hours and avoid wasting time traveling to and from work. If you counted up the average commute of two hours a day you could claw …

Know Your Enemy: Sebek2 – A kernel based data capture tool

To observe intruders using session encryption, researchers needed to find a way to break the session encryption. For many organizations this has proven extremely difficult. In …

Creating Trustworthy Archives

The efficient and secure storage of business records is fundamental to the insurance industry. Since its conception, organisations and individuals providing insurance services …

Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server

This paper presents several methods of bypassing the protection mechanism built into Microsoft’s Windows 2003 Server that attempts to prevent the exploitation of stack …

Spam Prevention Tips for Small Businesses

Excedent Technologies, company dealing with email hosting, anti-virus and Spam filtering solutions, published recommended tips for small businesses and business owners on how …

Exposing Your Life – the Top Facts on PDA Usage

If one in three houses in your street were left with their front doors open at night would you think their owners were asking for trouble? One in three PDA users keep their …

New Automated 802.11 Wireless Security Software From Code Red Systems

A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …

Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”

Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …

OpenSSH Buffer Management Vulnerability

Early today we received a note that there are rumblings in the underground related to a new OpenSSH vulnerability. The official web site says that a new version of OpenSSH was …

Wireless Security: Preventing Your Data From Vanishing Into Thin Air

Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information …

An Integrated Approach to Threat Management

Effective Threat Management embodies the actions organizations must take to defend themselves against today’s ever-present cyber-threats. At a high-level, these actions …

Don't miss

Cybersecurity news