Please turn on your JavaScript for this page to function normally.
Handbook for Computer Security Incident Response Teams (CSIRTs)

The document is aimed at aiding the planning, creation and development of CSIRTs: teams trained specifically to deal with IT security incidents. One of the principal tasks of …

Linux Security: Public Key and Symmetric Key Encryption

This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Public Key Encryption In order to use public key …

Trustix Secure Linux 2.0 Beta 2 Released

Trustix team announced that Trustix Secure Linux 2.0 beta 2 (aka Hurricane) is available for download. As this is a beta release, it is not intended for usage on production …

Commentary on Microsoft .NET Passport Vulnerability BugTraq Disclosure

Qazi Ahmed from PakCERT sent us a commentary on the Microsoft .NET Passport vulnerability announced yesterday on several security lists: “This is to clearify the issue …

Interview with Harvey Bondar, Vice President of Worldwide Marketing at Digital Persona

Introduce Digital Persona. When was the company started and with what mission? Digital Persona was founded in 1996 with the intention to bring biometric (fingerprint …

How an Antivirus Program Works

From the early viruses, created as experiments in the eighties, to the latest malicious code, one of the biggest worries for all computer users is the threat of viruses …

Application Security Releases DbEncrypt for Microsoft SQL Server

Application Security, Inc. today announced DbEncrypt for Microsoft SQL Server. This latest version of DbEncrypt is part of the company’s expanding set of application …

Positive Identification in a Wireless World

The use of wireless systems for network and Web access is exploding-from wireless LANs to e-mail capable cell phones. It makes network access completely portable, and with …

ISS “X-Force Internet Watch” Web Site Compromised

Well known defacement archive Zone-H reported that one of the Internet Security Systems’ servers has been compromised. According to the Google’s cache, the server, …

Web Seminar on FIRE Forensic Linux Environment

This Wednesday, May 7th at 1pm EDT (1700 UTC), SANS is hosting a web seminar titled “5 Ways to FIRE up Your Incident Response and Forensic Environment”. Webcast …

OpenBSD 3.3 has been released

OpenBSD 3.3. is here. To get the files for this release either order a CDROM or check out one of the FTP page for a list of mirrors. Some of the new features are: Integration …

Interview with Anonymous, lead author of “Maximum Security 4/e”

Who is Anonymous? Introduce yourself to our readers. I’m not sure Pearson Education really wants this question answered. In any event, I was born 11/24/1964 at 12:01 …

Don't miss

Cybersecurity news