Traditional Intrusion Detection Model Outdated and Distracting
The Internet and interoperable intranets are a vast and complex dimension of both enabling and inhibiting data flows. Current generation intrusion detection (ID) systems are …
The Internet and interoperable intranets are a vast and complex dimension of both enabling and inhibiting data flows. Current generation intrusion detection (ID) systems are …
On November 20, 2000, I was sent an e-mail by someone who called himself Zorgon. It read: CGIForum is a free forum. We can set `thesection’ parameter to view files on …
“And there’s the sign, Ridcully,” said the Dean. “You HAVE read it, I assume. You know? The sign which says “Do not, under any circumstances, …
Ever since there has been a “hackerscene” there has been a constant struggle between its “inhabitants” and mainstream media over words. That’s …
HNN published an article called “A hacker’s guide to talking to the media”. It was received with different opinions around the scene (I remember it referred …
Several days ago I visited an on-line forum of one of the Internet Presence Providers (IPP) in my country and found a topic dealing with spam. One user of the IPP in this …
Obviously there are a lot of technically talented individuals running around in the hacking scene nowadays. There always have, it’s the root of its existence. This has …
Last week, 03-09-00 to be exact, a Dutch television show exposed the Dutch banking organisation ABN AMRO’s HomeNet program as being insecure. Computer science students …
The new virus war zone: Your PDA”, “Take care of the Palm virus”, “Virus attacks portable devices” etc – these are titles of some of the …