Help Net Security
Bull Evidian’s Portalxpert 3.1 Delivers Universal And Instant Web Security For The Extended Enterprise
With PortalXpert 3.1, Bull Evidian helps corporations rapidly build secure, user-friendly B2E, B2B and B2C infrastructures. Paris, April 12, 2002: Bull Evidian, the secure …
Sophos Helps Teachers And Pupils Get Top Marks For Virus Protection
UK anti-virus vendor produces guidelines for safe computing in the classroom Sophos, a world leader in anti-virus protection, has today released a series of information packs …
United Messaging Deploys Trend Micro Solutions for Its Managed Exchange Service Subscribers
Trend Micro(TM) ScanMail(TM) for Microsoft(R) Exchange 2000 Provides Managed Virus Protection; Secures and Defends Against Security Threats CUPERTINO, Calif and MALVERN, Penn. …
Cogient Corp Clients are Secure through E-Certify’s Secure Web Application Portal
Toronto, ON April 5, 2002 – E-Certify announced today that an agreement has been signed with Cogient Corp., a healthcare application service provider, to supply the …
McAfee.com Acquires Leading Anti-Spam Technology to Attack Fast Growing Internet Problem
‘SpamKiller’ Creator and Anti-Spam Expert to Join Company SUNNYVALE, Calif., April 10 /PRNewswire-FirstCall/ — McAfee.com (Nasdaq: MCAF), a leading provider …
Know Your Enemy: Passive Fingerprinting
This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …
Know Your Enemy: Worms at War
See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …
Know Your Enemy: Motives
This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.
Know Your Enemy: A Forensics Analysis
This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …
Know Your Enemy: III
What happens after the script kiddie gains root. Specifically, how they cover their tracks while they monitor your system. The paper goes through step by step on a system that …
Know Your Enemy: II
How to determine what the enemy is doing by analyzing your system log files. Includes examples based on two commonly used scanning tools, sscan and nmap. Read the paper in …
Know Your Enemy
The tools and methodology of the most common black-hat threat on the Internet, the Script Kiddie. By understanding how they attack and what they are looking for, you can …
Featured news
Resources
Don't miss
- When security decisions come too late, and attackers know it
- OpenClaw Scanner: Open-source tool detects autonomous AI agents
- Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
- Microsoft begins Secure Boot certificate update for Windows devices
- Microsoft Patch Tuesday: 6 exploited zero-days fixed in February 2026