Expert analysis
Why Managed Security Services are so Popular in Financial Institutions
‘Managed Security Services’ seems to be one of the new buzzwords in the ICT sector. When signing up with a Managed Security Service Provider (MSSP), this company …
Basic Security Measures for FreeBSD
Introduction This document will describe the basic security measures that should be applied to a FreeBSD 4.x workstation. Mostly all of these measures should be applied in a …
Building and Implementing a Successful Information Security Policy
The purpose of this paper is to outline the strategies and managing processes behind implementing a successful Security Policy. Additionally, I will give recommendations for …
Firebox SOHO 6 Wireless Security Product Line Announced
WatchGuard Technologies, Inc., today announced the new Firebox SOHO 6 Wireless product line. Featuring an integrated 802.11b Wireless Access Point, 4-port LAN 10/100 switch …
Sybari Releases Antigen 7.0 for Domino
Sybari Software, Inc., today announced that Antigen 7.0 for Lotus Domino is shipping and available. According to the media release, this new version of Antigen for Domino will …
Security Efforts for Data In Motion Should Be Put to Rest
Everybody knows that it is easier to hit a stationary target than a fast-moving target. Yet, an enormous amount of resources are being used to encrypt data in motion, while …
Intrusion detection
A computer system should provide confidentiality, integrity and assurance against intrusion attempts. However, due to increased connectivity on the Internet, more and more …
Teaching How To Create Malicious Code
In universities around the world, a question has arisen about computer studies syllabuses: should students be taught how to create viruses and malicious code? There are …
Trustix Secure Linux 2.0 Beta 3 Released
Trustix team announced that Trustix Secure Linux 2.0 beta 3 (aka Lightning) is available for download. As this is a beta release, it is not intended for usage on production …
Unix Security: The FormMail Hack
Is your Web server being used as a Spam Mail relay? It could be, and it doesn’t even need a daemon listening on the SMTP port. How’s it done, and how do you …
Analysis of Remote Active Operating System Fingerprinting Tools
There are many tools today that are used for remote active operating system fingerprinting. They all have their own fingerprinting techniques. This paper gives an in-depth …
Antivirus and EFS in Windows Server 2003
The need to transmit secret or sensitive information has been around for a long time, and cryptography, in one shape or form, has been around for almost as long. The Spartans …