Help Net Security
Installation of a Secure Web Server
Apart from firewalls, which aim at protecting internal networks against attacks from the internet, web servers are the second important field requiring a high degree of …
BlackHat 2001 Attrition Slide Presenation
This is the presentation that the Attrition staff presented at the BlackHat Briefings 2001. It shows how they managed their defacement mirror as well as the problems related …
Automating Penetration Tests: A new challenge for the IS industry?
This is the presentation from the BlackHat Briefings by Ivan Arce and Maximiliano Caceres. Download the presentation in PDF format here.
Attack on Private Signature Keys of the OpenPGP format, PGP programs and other applications compatible with OpenPGP
The article describes an attack on OpenPGP format, which leads to disclosure of the private signature keys of the DSA and RSA algorithms. The OpenPGP format is used in a …
Advanced Host Detection – Techniques To Validate Host-Connectivity
This paper will attempt to describe techniques used to discover heavily filtered and firewalled hosts, that will not answer to standard PING responses. It is assumed that the …
Results of the Security in ActiveX Workshop
On August 22-23, 2000, the CERT Coordination Center hosted a workshop in Pittsburgh, Pennsylvania, for twenty invited experts to address security issues related to ActiveX …
The ABC of computer security
This White Paper gives an introduction to computer security and its significance for businesses, followed by an alphabetical guide to common security measures and threats. …
Unverified Fields – A Problem with Firewalls & Firewall Technology Today
The following problem (as discussed in this paper) has not yet been identified. Certain firewalls today, will not authenticate the validity of certain protocol fields, within …
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to …
Survey 2000 – Security Focused
New research confirms that corporations are spending more and more money on securing their digital information, but cybersecurity breaches continue to climb anyway. According …
Quantum Cryptography
This tutorial will give you a basic idea about quantum cryptography. Download the tutorial in ZIP format here.
Mail Abuse Prevention Organization stands up to giant Harris Interactive
Mail Abuse Prevention System, the Redwood City based anti-spam organization, says that it will vigorously defend the law suit filed by online market research giant Harris …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments