Help Net Security
White-Hat Security Arsenal: Tackling the Threats
I can recommend this book to anybody who is novice in the world of computer security as it will provide you with a good clue what you're up against, and how to deal with it. …
Building Secure Software: How to Avoid Security Problems the Right Way
A great book about secure software developing, that not only the developers should read, but also the managers and security experts. It's a must for any serios company that …
Authentication: From Passwords to Public Keys
I can recommend it as a good starting point for all interested, as it will prove to be more than sufficient for all network professionals and those aspiring to become one, but …
Computer Forensics: Incident Response Essentials
If computer forensics classes start to pop up massively, this will be the book to base them on. Nothing can prove to be a substitute for experience, but it will point the …
Linux System Administration – A User’s Guide
This is a fine book on system administration, with more information than you'll likely ever need. It also serves as a great pointer and reference guide. However, don't expect …
Beta Test New Sophos MailMonitor Functionality
Sophos has made available beta versions of its MailMonitor for SMTP products on the Solaris/Sparc Unix, Windows NT/2000 and Linux/Intel platforms. These betas include a number …
Microsoft Systems Administrators Rave About Free Ecora Patch Analysis Tool
PatchMeister enables admins to analyze missing patches within their Microsoft environment in minutes;Intuitive user interface takes patch management to a new level of …
Intrusion Inc. Elects Michael Paxton Vice President, Chief Financial Officer, Treasurer, and Secretary
RICHARDSON, Texas–(BUSINESS WIRE)–Aug. 13, 2002–Intrusion Inc. (Nasdaq:INTZ), (“Intrusion”), today announced that Michael Paxton had been elected …
Security Company-PivX, Adds Another World Class Security Researcher who has found a Major Vulnerability in Apache Server Software
Newport Beach, CA, August 13, 2002 : PivX Solutions, a leader in Network Security is pleased to announce the hiring of one of the worlds pre-eminent security researchers, …
Georgia State University Selects Network-1’s Firewall Product To Secure Windows NT and Windows 2000 Campus Systems
CyberwallPLUS Protects Faculty, Staff and Students from Hacker Attacks and Intrusions WALTHAM, Mass., Aug 14, 2002 /PRNewswire-FirstCall via COMTEX/ — Network-1 Security …
Check Point First To Secure IPv6, Peer-To-Peer, Instant Messaging
Check Point First To Secure IPv6, Peer-To-Peer, Instant Messaging Applications And Microsoft File Sharing And Print Services Industry Firsts Reinforce Check Point …
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
We recently noted that PGP and other e-mail encryption protocols are, in theory, highly vulnerable to chosen-ciphertext attacks in which the recipient of the e-mail acts as an …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer