Expert analysis
Statement Regarding GNU FTP Site Hack
To the Free Software Community: Summary * gnuftp, the FTP server for the GNU project was root compromised. A replacement machine was rolled out in its place on the morning …
Detecting and Understanding Rootkits
Well, well, well. You have installed the latest Linux distribution and stopped all unnecessary services. You also set-up a set of Netfilter rules that would make the Pentagon …
Advanced Encryption Standard by Example
The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to …
MS Blaster Worm Roundup
Blaster Worm scans the Internet for computers that are vulnerable to its attack. Once found, it tries to enter the system through the port 135 to create a buffer overflow. One …
The Present and Future of Xprobe2 – The Next Generation of Active Operating System Fingerprinting
Although some advancement was made in the field of active operating system fingerprinting in the recent years, still, there are many issues to resolve. This paper presents the …
Chief Security Officer’s Point of View
CSO magazine recently did a poll, where 480 chief security officers and senior security executives discussed security issues and industry regulations. Besides the …
Entrust Releases New Secure Web Portal Solution
Entrust released its latest Secure Web Portal Solution based on Entrust TruePass Version 7.0, the first Web security solution in the market today to deliver bi-directional, …
Basic: Vulnerability Assessment
This document serves as an introduction to the subject of security vulnerability assessments. It focuses primarily on vulnerability assessments performed from an …
Lack of Security at Wireless Conferences
During the 802.11 Planet Expo in Boston, wireless security company AirDefense monitored WLAN activity and published their findings in the July 2003 edition of WLAN Watch …
Novell eDirectory has Additional Linux Support and Enhanced Security
Novell announced Red Hat Enterprise Linux AS and SuSE Linux Enterprise Server 8 support in Novell eDirectory, the most widely deployed directory service on the market. Along …
LDAP Injection: Are Your Web Applications Vulnerable?
Lightweight Directory Access Protocol (LDAP) is a widely used protocol for accessing information directories. LDAP injection is the technique of exploiting web applications …
Stolen PDAs Provide Open Door To Corporate Networks
The PDA Usage Survey 2003 commissioned by Pointsec Mobile Technologies and conducted by Infosecurity Europe and Computer Weekly has found that PDA owners commonly download the …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025