Expert analysis
St. Bernard Announces E-mail Filtering Appliance
San Diego based St. Bernard Software Inc., announced ePrism Mail Filter – their new e-mail filtering appliance featuring a full combo of e-mail security, spam …
NIST to Host a Biometrics Conference
The National Institute of Standards and Technology is holding the Biometric Consortium’s fall conference, BC 2003, to showcase recent advances in the field and examine …
Symantec AntiVirus for Handhelds Product Line Announced
Symantec Corp. announced the Symantec AntiVirus for Handhelds line of consumer and enterprise solutions. The product line will include three versions of Symantec AntiVirus for …
Edelman Cybersecurity Survey: Viruses Impact One-Third Of American Internet Users
Edelman provides comprehensive public relations and marketing services to computer security companies in the United States. They’re recent survey shows that nearly one …
Sygate Announces Sygate Secure Enterprise 3.5
The latest version of Sygate’s enterprise solution includes strategic enhancements that enable Sygate agents to automatically and cost-effectively enforce corporate …
PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. …
Blaster Only Set to Stun
Once again, it appears that the worm authors had caught system administrators with their trousers down. Despite the availability of a patch since mid-July to fix the …
Statement Regarding GNU FTP Site Hack
To the Free Software Community: Summary * gnuftp, the FTP server for the GNU project was root compromised. A replacement machine was rolled out in its place on the morning …
Detecting and Understanding Rootkits
Well, well, well. You have installed the latest Linux distribution and stopped all unnecessary services. You also set-up a set of Netfilter rules that would make the Pentagon …
Advanced Encryption Standard by Example
The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL) encryption algorithm. The purpose of this paper is to …
MS Blaster Worm Roundup
Blaster Worm scans the Internet for computers that are vulnerable to its attack. Once found, it tries to enter the system through the port 135 to create a buffer overflow. One …
The Present and Future of Xprobe2 – The Next Generation of Active Operating System Fingerprinting
Although some advancement was made in the field of active operating system fingerprinting in the recent years, still, there are many issues to resolve. This paper presents the …