Expert analysis
Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server
This paper presents several methods of bypassing the protection mechanism built into Microsoft’s Windows 2003 Server that attempts to prevent the exploitation of stack …
Spam Prevention Tips for Small Businesses
Excedent Technologies, company dealing with email hosting, anti-virus and Spam filtering solutions, published recommended tips for small businesses and business owners on how …
Exposing Your Life – the Top Facts on PDA Usage
If one in three houses in your street were left with their front doors open at night would you think their owners were asking for trouble? One in three PDA users keep their …
New Automated 802.11 Wireless Security Software From Code Red Systems
A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …
Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”
Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …
OpenSSH Buffer Management Vulnerability
Early today we received a note that there are rumblings in the underground related to a new OpenSSH vulnerability. The official web site says that a new version of OpenSSH was …
Wireless Security: Preventing Your Data From Vanishing Into Thin Air
Despite its many exciting possibilities for new business opportunities, cost-savings, and user freedom, wireless technology presents serious challenges to information …
An Integrated Approach to Threat Management
Effective Threat Management embodies the actions organizations must take to defend themselves against today’s ever-present cyber-threats. At a high-level, these actions …
A Walk Through “Sombria”: A Network Surveillance System
Sombria (“shadowy” in Portuguese) is a honeypot system set up in Tokyo, Japan, that is intended for network surveillance and research and not for production …
Interview with John Vacca, information technology consultant and internationally known author
John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …
Information Security Checklist
Today’s heightened awareness of the need to secure IT infrastructures and protect mission critical data is leading more and more organizations to reevaluate their …
Protecting Databases
One of the more recent evolutions in network security has been the movement away from protecting the perimeter of the network to protecting data at the source. The reason …