Expert analysis
Security Efforts for Data In Motion Should Be Put to Rest
Everybody knows that it is easier to hit a stationary target than a fast-moving target. Yet, an enormous amount of resources are being used to encrypt data in motion, while …
Intrusion detection
A computer system should provide confidentiality, integrity and assurance against intrusion attempts. However, due to increased connectivity on the Internet, more and more …
Teaching How To Create Malicious Code
In universities around the world, a question has arisen about computer studies syllabuses: should students be taught how to create viruses and malicious code? There are …
Trustix Secure Linux 2.0 Beta 3 Released
Trustix team announced that Trustix Secure Linux 2.0 beta 3 (aka Lightning) is available for download. As this is a beta release, it is not intended for usage on production …
Unix Security: The FormMail Hack
Is your Web server being used as a Spam Mail relay? It could be, and it doesn’t even need a daemon listening on the SMTP port. How’s it done, and how do you …
Analysis of Remote Active Operating System Fingerprinting Tools
There are many tools today that are used for remote active operating system fingerprinting. They all have their own fingerprinting techniques. This paper gives an in-depth …
Antivirus and EFS in Windows Server 2003
The need to transmit secret or sensitive information has been around for a long time, and cryptography, in one shape or form, has been around for almost as long. The Spartans …
Gearing Up For July 1, 2003 – Senate Bill 1386 – How Does It Affect You?
On July 1, 2003, Senate bill 1386 becomes Civil Code 1798.82. In a nutshell, the law states that any person or company doing business in the state of California is responsible …
Interview with Ivan Arce, CTO of Core Security Technologies
Ivan Arce, Chief Technology Officer of Core Security Technologies, sets the technical direction for the company and is responsible for overseeing the development, testing and …
Apache 2.0.46 Released – Security and Bugfix Release
The Apache Software Foundation and the Apache HTTP Server Project are pleased to announce the ninth public release of the Apache 2.0 HTTP Server. This Announcement notes the …
RSA Security 2003 IT Security Survey Presented
The Emmes Group, a San Francisco-based strategy consulting and market research firm, conducted an in-depth market research survey at the RSA 2003 Conference in San Francisco. …
Key Iterations and Cryptographic Salts
The following document discusses the use of key iterations and cryptographic salts to stop dictionary attacks in password based encryption (symmetric cryptography). One of the …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025