Expert analysis
Tips on basic Linux server security
If you just put your Apache web server online, and are thinking into making the first step in your system security, this brief article will help you do that. By having your …
Astaro Security Linux 3.0 announced
At the Networld + Interop Conference, Astaro Corporation announced version 3 of its combined Astaro Security Linux firewall / VPN / anti-virus / content filtering security …
iKey for Windows 2000 USB security token
Rainbow eSecurity a division of Rainbow Technologies, Inc. developed a new offering in their iKey 2032 USB security token series – iKey for Windows 2000. The new product …
Simplicity and Awareness – Keys to Network Security
Few people believe that maintaining a sound network security posture is easy. Those who do are deluding themselves, unless they practice two fundamental tenets of security: …
Red Hat 7.3 has been released
Red Hat, Inc. released Red Hat Linux version 7.3, a highly configurable OS designed for deployments ranging from games and personal productivity to file, print and web …
Upcoming security conferences in 2002
Conference: 14th Annual Computer Security Incident Handling Conference (FIRST 2002) Date: June 24-28, 2002 Place: Hilton Waikoloa Village, Hawaii URL: The FIRST conference …
Remote Timing Techniques
This paper describes remote timing techniques based on TCP/IP intrinsic operation and options. The techniques are used for careful observation of the TCP/IP data stream to …
Anti-Trojan and Trojan Detection with In-Kernel Digital Signature testing of Executables
This paper presents a somewhat compute expensive way to detect or deny the activity of Trojan or otherwise modified executable files that may have been tampered with in any …
Know Your Enemy: Passive Fingerprinting
This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …
Know Your Enemy: Worms at War
See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …
Know Your Enemy: Motives
This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.
Know Your Enemy: A Forensics Analysis
This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …
Featured news
Resources
Don't miss
- Cozy Bear targets EU diplomats with wine-tasting invites (again)
- Funding uncertainty may spell the end of MITRE’s CVE program
- When companies merge, so do their cyber threats
- Strategic AI readiness for cybersecurity: From hype to reality
- Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques