Expert analysis
Securing Linux
Here we go again. I decided to write another article concerning some overall security aspects of installing and running linux. To keep it short and simple, here are some good …
Overview of personal firewalls
With the constant rise of permanent broadband connections that have many workstations online 24/7, there has been a growth in the number of attacks. In order to get a certain …
Tips on basic Linux server security
If you just put your Apache web server online, and are thinking into making the first step in your system security, this brief article will help you do that. By having your …
Astaro Security Linux 3.0 announced
At the Networld + Interop Conference, Astaro Corporation announced version 3 of its combined Astaro Security Linux firewall / VPN / anti-virus / content filtering security …
iKey for Windows 2000 USB security token
Rainbow eSecurity a division of Rainbow Technologies, Inc. developed a new offering in their iKey 2032 USB security token series – iKey for Windows 2000. The new product …
Simplicity and Awareness – Keys to Network Security
Few people believe that maintaining a sound network security posture is easy. Those who do are deluding themselves, unless they practice two fundamental tenets of security: …
Red Hat 7.3 has been released
Red Hat, Inc. released Red Hat Linux version 7.3, a highly configurable OS designed for deployments ranging from games and personal productivity to file, print and web …
Upcoming security conferences in 2002
Conference: 14th Annual Computer Security Incident Handling Conference (FIRST 2002) Date: June 24-28, 2002 Place: Hilton Waikoloa Village, Hawaii URL: The FIRST conference …
Remote Timing Techniques
This paper describes remote timing techniques based on TCP/IP intrinsic operation and options. The techniques are used for careful observation of the TCP/IP data stream to …
Anti-Trojan and Trojan Detection with In-Kernel Digital Signature testing of Executables
This paper presents a somewhat compute expensive way to detect or deny the activity of Trojan or otherwise modified executable files that may have been tampered with in any …
Know Your Enemy: Passive Fingerprinting
This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …
Know Your Enemy: Worms at War
See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …
Featured news
Resources
Don't miss
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders