MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Unix Insider
November 2000
Sandra Henry-Stocker
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... mark for My Articles similar articles
Popular Mechanics
March 2008
Joel Johnson
How to Configure Wireless Routers With IP Addresses: Tech Clinic How IP addresses are assigned. mark for My Articles similar articles
RootPrompt.org
June 14, 2000
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Popular Mechanics
June 2007
Joel Johnson
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. mark for My Articles similar articles
InternetNews
July 27, 2004
Jim Wagner
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. mark for My Articles similar articles
RootPrompt.org
May 7, 2001
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... mark for My Articles similar articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
PC Magazine
June 23, 2008
Matthew D. Sarrel
How Secure Is Your Company? To protect your business, think like a thief. mark for My Articles similar articles
PC Magazine
October 14, 2003
The Lookout: Blaster and SoBig Move In The Blaster worm continued to tear through the Internet in August, followed almost immediately by an improved version of the SoBig worm, as security experts struggled to find and fix infected systems. mark for My Articles similar articles
InternetNews
August 15, 2005
Jim Wagner
Zotob Targets Windows Update Laggards A critical vulnerability in Microsoft's plug-and-play code can wreak havoc on unpatched PCs. mark for My Articles similar articles
InternetNews
April 20, 2004
Michael Singer
Flaw Puts TCP Data Transfer At Risk Officials say systems that rely on persistent TCP connections, such as routers supporting BGP, could be affected. mark for My Articles similar articles
InternetNews
October 3, 2005
Tim Gray
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. mark for My Articles similar articles
InternetNews
June 3, 2005
Tim Gray
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. mark for My Articles similar articles
Bank Technology News
December 2010
Michael Sisk
Endgame Systems Finds Botnets in the Cloud Security software provider Endgame Systems raised $29 million in the fall and simultaneously launched ipTrust, a product meant to detect and manage the harm caused by malware and botnets in cloud computing environments mark for My Articles similar articles
PC Magazine
December 9, 2003
The Lookout: Faulty Patch Leaves IE Open An incomplete patch has opened a vulnerability in Internet Explorer, and security experts say there are at least four methods attackers can use to compromise vulnerable PCs. mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
IEEE Spectrum
December 2007
Nucci & Bannerman
Controlled Chaos We need to exploit the science of order and disorder to protect networks against coming generations of superworms. mark for My Articles similar articles
PC Magazine
March 7, 2008
Larry Seltzer
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. mark for My Articles similar articles
Unix Insider
December 2000
Sandra Henry-Stocker
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? mark for My Articles similar articles
PC Magazine
February 26, 2007
Robert P. Lipschutz
Perimeter eSecurity Vulnerability Assessment Taking a simple step can reveal holes in your small business's network. mark for My Articles similar articles
Linux Journal
April 2000
Preston F. Crow
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. mark for My Articles similar articles
Linux Journal
February 1, 2002
Gianluca Insolvibile
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... mark for My Articles similar articles
InternetNews
January 29, 2004
Zachary Rodgers
'MyDoom' Variant Blocking Ad Servers Virus could result in under-delivery of online campaigns. mark for My Articles similar articles
InternetNews
April 23, 2004
Ryan Naraine
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. mark for My Articles similar articles
PC World
February 2006
Scott Spanbauer
Knowledge Is Power: Your Essential Internet Glossary Learn a few key terms to become more Internet savvy mark for My Articles similar articles
IEEE Spectrum
May 2005
Riordan, Wespi & Zamboni
How to Hook Worms Because a computer network cannot ward off every last Internet worm, it must sound an alarm the minute one slithers inside. mark for My Articles similar articles
IEEE Spectrum
June 2006
Nicolas Boillot
Beating the Crunch There's no way around it: Internet Protocol version 6 is happening, but the benefits will be slight at first, and patience is required. Besides providing more addresses, IPv6 offers greater security and it has features that improve real-time applications. mark for My Articles similar articles
Linux Journal
April 1, 2007
Dinil Divakaran
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. mark for My Articles similar articles
PC Magazine
February 15, 2006
Matthew D. Sarrel
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
Wired
August 23, 2007
John Robb
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. mark for My Articles similar articles
InternetNews
July 8, 2005
David Needle
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. mark for My Articles similar articles
PC Magazine
July 1, 2003
Leon Erlanger
Ready for IPv6, Part 2 The new Internet Protocol (IP) standard promises to make connections more ubiquitous, efficient, and secure. But how will we implement it? mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
PC World
April 9, 2001
Andrew Brandt
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
PC Magazine
April 19, 2006
A Disconnecting Wireless Network Allocate the IP address permanently from the PC to avoid constant repairing of a connection after a computer has been in sleep mode. mark for My Articles similar articles
InternetNews
November 19, 2007
Andy Patrizio
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. mark for My Articles similar articles
InternetNews
May 28, 2009
Alex Goldman
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. mark for My Articles similar articles
Bank Technology News
November 2007
Yuval Ben-Itzhak
The New Enemy: A Trojan Worse Than Phishing Finjan's Malicious Code Research Center discovered evidence of a new genre of crimeware Trojan that steals bank customers' identities without so much as leaving a trace. mark for My Articles similar articles
InternetNews
May 25, 2005
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. mark for My Articles similar articles
CAUSE/EFFECT
Vol 22 Num 2 1999
Mark Sheehan and Allen Porter
Authenticated Off-Net Access to Commercial Library Resources When an institution licenses data from a provider for use by its memembers, how can it ensure that only its own members can access the data while also being flexible enough to allow them to access the data when they are off site? mark for My Articles similar articles
PC Magazine
September 12, 2007
Neil J. Rubenking
Automate Network Configuration Changes I have a laptop and often need Internet access from multiple offices. Is there a way to store multiple configurations/IP addresses to eliminate having to remember and reenter the IP address? mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
InternetNews
May 11, 2006
Andy Patrizio
We're Running Out of IP Addresses Frost & Sullivan analyst says we have until 2010 before there are no more addresses to be had. mark for My Articles similar articles
RootPrompt.org
June 19, 2000
Noel D.
Trust and the System Administrator A System Administrator has a strange relationship with the equipment they manage, with the people using their system and with the world outside their systems. I will overview some of the choices and decisions that Sys Admins must understand when building or maintaining their systems. mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles