Expert analysis
An In-Depth Look Into Windows Security in 2003
When it comes to security predictions for next year, basically everyone says it’s going to be worst than this year despite the increased spending on security and some …
Top Five Technologies to Fight Spam in 2004
Exchange Server anti-virus and secure content management product provider Nemx Software, published a list of top spam trends and technologies for 2004. In 2004, the threat of …
Interview with Jon Edney, author of “Real 802.11 Security”
Jon Edney specializes in wireless networking and is a key contributor to the development of IEEE 802.11 systems. As a member of the technology consultancy Symbionics Networks, …
Airscanner Announces Mobile Encrypter and Discontinuation of Mobile Sniffer
Dallas based Airscanner Corporation, announced the upcoming release of Airscanner Mobile Encrypter beta. The Airscanner Mobile Encrypter is an application that secures the …
The Virus That Came From Outer Space
An American website has published a warning of the possible appearance of a virus from outer space. No, it’s not a joke. The claim was made by Richard Carrigan, a …
“Sombria:” A Witness to Potential Cyber Crimes
The second report of Sombria provides a more succinct and focused overview of the main events “witnessed” by the honeypot system during the months of August, …
Packet Sniffing on Layer 2 Switched Local Area Networks
Packet sniffing is a technique of monitoring network traffic. It is effective on both switched and nonswitched networks. In a non-switched network environment packet sniffing …
Hackproofing DB2
The main points of this presentation are: The state of DB2 security Secure configuration of DB2 Securing DB2 in a Web application Database vulnerabilities Download the …
Overview of Virus Bulletin December 2003 Issue
The December issue of Virus Bulletin magazine starts with an editorial written by the magazine’s new Technical Editor Morton Swimmer. In his first commentary piece, Mr. …
Remote Hot Spot – The Market For SSL VPNs Catches Fire
Welcome to the world of Secure Sockets Layer (SSL) Virtual Private Networks (VPNS), the hottest of hotspots in town, fuelled by the surge towards more remote working for …
Interview with Michael J. Weber, author of “Invasion of Privacy”
Michael J. Weber’s career began on Madison Avenue where he produced hundreds of TV commercials, including several award winners, for top sponsors and ad agencies. He …
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
Network intrusion detection systems have become one of several invaluable tools to safeguard critical infrastructure and information. Publicly available network intrusion …