Similar Articles |
|
Unix Insider November 2000 Sandra Henry-Stocker |
Tapping on the walls Paring down your network services isn't the only way to protect your systems against attacks: port scanning can also be an effective tool. Here's how to stay one step ahead of your enemy... |
Popular Mechanics March 2008 Joel Johnson |
How to Configure Wireless Routers With IP Addresses: Tech Clinic How IP addresses are assigned. |
RootPrompt.org June 14, 2000 |
The Secrets of Snoop Lance Spitzner tell us about the secrets of Snoop: A passive approach to your network security. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
InternetNews July 27, 2004 Jim Wagner |
More Gloom from MyDoom Virus The latest version of the virus is a vehicle for another Trojan horse, which attacks Microsoft.com... Symantec releases a removal tool. |
RootPrompt.org May 7, 2001 |
Testing a Router or Firewall We do not present a generic high level method. Indeed, every network administrator has its own way to set up a device or to solve a problem. We emphasize on the low level method by presenting key points, which can be linked together in order to construct the method of every person... |
RootPrompt.org May 29, 2000 Reto Haeni |
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). |
PC Magazine June 23, 2008 Matthew D. Sarrel |
How Secure Is Your Company? To protect your business, think like a thief. |
PC Magazine October 14, 2003 |
The Lookout: Blaster and SoBig Move In The Blaster worm continued to tear through the Internet in August, followed almost immediately by an improved version of the SoBig worm, as security experts struggled to find and fix infected systems. |
InternetNews August 15, 2005 Jim Wagner |
Zotob Targets Windows Update Laggards A critical vulnerability in Microsoft's plug-and-play code can wreak havoc on unpatched PCs. |
InternetNews April 20, 2004 Michael Singer |
Flaw Puts TCP Data Transfer At Risk Officials say systems that rely on persistent TCP connections, such as routers supporting BGP, could be affected. |
InternetNews October 3, 2005 Tim Gray |
Trojan Exploits Office A Trojan Horse attacking Microsoft Office has been around since April. The malicious code is disguised as a Microsoft Access file. |
InternetNews June 3, 2005 Tim Gray |
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. |
Bank Technology News December 2010 Michael Sisk |
Endgame Systems Finds Botnets in the Cloud Security software provider Endgame Systems raised $29 million in the fall and simultaneously launched ipTrust, a product meant to detect and manage the harm caused by malware and botnets in cloud computing environments |
PC Magazine December 9, 2003 |
The Lookout: Faulty Patch Leaves IE Open An incomplete patch has opened a vulnerability in Internet Explorer, and security experts say there are at least four methods attackers can use to compromise vulnerable PCs. |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... |
IEEE Spectrum December 2007 Nucci & Bannerman |
Controlled Chaos We need to exploit the science of order and disorder to protect networks against coming generations of superworms. |
PC Magazine March 7, 2008 Larry Seltzer |
ID Theft: The Next Level The new virus Trojan.Silentbanker regularly patrols the Internet for banking sites it can manipulate. |
Unix Insider December 2000 Sandra Henry-Stocker |
OS identification When hackers plan to break into Websites, they first try to find out which operating system the site is using. Once they determine that and which services are running, their chances of successfully attacking a system are greatly increased. What can you do to stop them? |
PC Magazine February 26, 2007 Robert P. Lipschutz |
Perimeter eSecurity Vulnerability Assessment Taking a simple step can reveal holes in your small business's network. |
Linux Journal April 2000 Preston F. Crow |
The Linux Home Network Everything you need to know to make those Internet and intranet connections at home. |
Linux Journal February 1, 2002 Gianluca Insolvibile |
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... |
InternetNews January 29, 2004 Zachary Rodgers |
'MyDoom' Variant Blocking Ad Servers Virus could result in under-delivery of online campaigns. |
InternetNews April 23, 2004 Ryan Naraine |
'Osama Captured' e-Mail is Malicious Trojan The 'Osama Bin Laden Captured' e-mail hammering your in-box today will attempt to download a Trojan if the embedded URL is clicked. |
PC World February 2006 Scott Spanbauer |
Knowledge Is Power: Your Essential Internet Glossary Learn a few key terms to become more Internet savvy |
IEEE Spectrum May 2005 Riordan, Wespi & Zamboni |
How to Hook Worms Because a computer network cannot ward off every last Internet worm, it must sound an alarm the minute one slithers inside. |
IEEE Spectrum June 2006 Nicolas Boillot |
Beating the Crunch There's no way around it: Internet Protocol version 6 is happening, but the benefits will be slight at first, and patience is required. Besides providing more addresses, IPv6 offers greater security and it has features that improve real-time applications. |
Linux Journal April 1, 2007 Dinil Divakaran |
Starting a Linux Firewall from Scratch Here are the basic steps involved in developing a firewall from scratch, using tools in Linux. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
Wired August 23, 2007 John Robb |
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. |
InternetNews July 8, 2005 David Needle |
CERT Warns on Latest Trojan Horse Attacks Targeted e-mail viruses may be behind some recent Internet outages. The trojan horse viruses can evade anti-virus software and appear to be from a trusted source. |
PC Magazine July 1, 2003 Leon Erlanger |
Ready for IPv6, Part 2 The new Internet Protocol (IP) standard promises to make connections more ubiquitous, efficient, and secure. But how will we implement it? |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
PC World April 9, 2001 Andrew Brandt |
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC Magazine April 19, 2006 |
A Disconnecting Wireless Network Allocate the IP address permanently from the PC to avoid constant repairing of a connection after a computer has been in sleep mode. |
InternetNews November 19, 2007 Andy Patrizio |
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. |
InternetNews May 28, 2009 Alex Goldman |
Flood of Fake Western Union E-mails Hide Trojan An influx of malware-laden spam, which started two weeks ago, continues today as hackers seek credit card and banking information. |
Bank Technology News November 2007 Yuval Ben-Itzhak |
The New Enemy: A Trojan Worse Than Phishing Finjan's Malicious Code Research Center discovered evidence of a new genre of crimeware Trojan that steals bank customers' identities without so much as leaving a trace. |
InternetNews May 25, 2005 |
Cisco Patches DNS, VoIP Flaws Cisco issued a patch for a domain name system vulnerability that could put some of its routers and Voice Over IP products at risk for exploits. |
CAUSE/EFFECT Vol 22 Num 2 1999 Mark Sheehan and Allen Porter |
Authenticated Off-Net Access to Commercial Library Resources When an institution licenses data from a provider for use by its memembers, how can it ensure that only its own members can access the data while also being flexible enough to allow them to access the data when they are off site? |
PC Magazine September 12, 2007 Neil J. Rubenking |
Automate Network Configuration Changes I have a laptop and often need Internet access from multiple offices. Is there a way to store multiple configurations/IP addresses to eliminate having to remember and reenter the IP address? |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
InternetNews May 11, 2006 Andy Patrizio |
We're Running Out of IP Addresses Frost & Sullivan analyst says we have until 2010 before there are no more addresses to be had. |
RootPrompt.org June 19, 2000 Noel D. |
Trust and the System Administrator A System Administrator has a strange relationship with the equipment they manage, with the people using their system and with the world outside their systems. I will overview some of the choices and decisions that Sys Admins must understand when building or maintaining their systems. |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |