Expert analysis
Interview with Michael J. Weber, author of “Invasion of Privacy”
Michael J. Weber’s career began on Madison Avenue where he produced hundreds of TV commercials, including several award winners, for top sponsors and ad agencies. He …
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
Network intrusion detection systems have become one of several invaluable tools to safeguard critical infrastructure and information. Publicly available network intrusion …
Circumventing Validation
Web developers spend a lot of time planning out complex chains of events to make thier web applications work. Within the planning and outlines, implicit control over the chain …
Real World XSS
This paper covers most aspects of XSS attacks including: injection points attack scenarios attacker motivations and techniques code obfuscation examples starts laying a …
Current Antivirus Software is Not Enough
The purpose of antivirus protection on a computer is to prevent the entrance of viruses. There is certainly good reason for using such software, as there are a great number of …
The Top 10 Internet Security Screw Ups
With over 10 years experience of defending against Internet Security threats, Tom Salkield, Managing Director of NetConnect, has seen it all. NetConnect, part of Netstore plc, …
Why Bother Virus Scanning?
I have always thought the idea of scanning for viruses to be flawed, well certainly as a security measure. Yet nearly all of you reading this article will be relying on just …
SOAP Web Services Attacks
The World Wide Web is being used increasingly for application-to-application communication, thanks to programmatic interfaces known as web services. In conjunction with …
Worms Of The Future: Trying To Exorcise The Worst
This is a research paper on the security (or lack of) within computer systems and ways of improvement with respect to mobile and hostile code such as worms. This paper should …
Flooding From The Underground – A Global Threat
When Khaled Mardam-Bey developed an IRC client for the Windows platform, I doubt he envisaged mIRC becoming the basis for the control of an immeasurable number of compromised …
Microsoft Releases Security Updates For November
These new security updates address newly discovered issues in Microsoft Windows, including Internet Explorer. Two of the updates are ranked as “Critical” while one …
Attacking the DNS Protocol
DNS is a heavily used protocol on the Internet yet has numerous security considerations. This paper whilst containing nothing new on DNS security brings together in one …