Please turn on your JavaScript for this page to function normally.
Sophos Helps Teachers And Pupils Get Top Marks For Virus Protection

UK anti-virus vendor produces guidelines for safe computing in the classroom Sophos, a world leader in anti-virus protection, has today released a series of information packs …

United Messaging Deploys Trend Micro Solutions for Its Managed Exchange Service Subscribers

Trend Micro(TM) ScanMail(TM) for Microsoft(R) Exchange 2000 Provides Managed Virus Protection; Secures and Defends Against Security Threats CUPERTINO, Calif and MALVERN, Penn. …

Cogient Corp Clients are Secure through E-Certify’s Secure Web Application Portal

Toronto, ON April 5, 2002 – E-Certify announced today that an agreement has been signed with Cogient Corp., a healthcare application service provider, to supply the …

McAfee.com Acquires Leading Anti-Spam Technology to Attack Fast Growing Internet Problem

‘SpamKiller’ Creator and Anti-Spam Expert to Join Company SUNNYVALE, Calif., April 10 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading provider …

Know Your Enemy: Passive Fingerprinting

This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …

Know Your Enemy: Worms at War

See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …

Know Your Enemy: Motives

This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.

Know Your Enemy: A Forensics Analysis

This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …

Know Your Enemy: III

What happens after the script kiddie gains root. Specifically, how they cover their tracks while they monitor your system. The paper goes through step by step on a system that …

Know Your Enemy: II

How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap. Read the paper in …

Know Your Enemy

The tools and methodology of the most common black-hat threat on the Internet, the Script Kiddie. By understanding how they attack and what they are looking for, you can …

World-Renowned Information Security Expert William H. Murray Joins Trusecure Corporation

Addition Complements Company’s Unparalleled Industry Expertise Herndon, Va.–April 9, 2002– TruSecure® Corporation, a leading managed security services …

Don't miss

Cybersecurity news