Please turn on your JavaScript for this page to function normally.
Tips on basic Linux server security

If you just put your Apache web server online, and are thinking into making the first step in your system security, this brief article will help you do that. By having your …

Astaro Security Linux 3.0 announced

At the Networld + Interop Conference, Astaro Corporation announced version 3 of its combined Astaro Security Linux firewall / VPN / anti-virus / content filtering security …

iKey for Windows 2000 USB security token

Rainbow eSecurity a division of Rainbow Technologies, Inc. developed a new offering in their iKey 2032 USB security token series – iKey for Windows 2000. The new product …

Simplicity and Awareness – Keys to Network Security

Few people believe that maintaining a sound network security posture is easy. Those who do are deluding themselves, unless they practice two fundamental tenets of security: …

Red Hat 7.3 has been released

Red Hat, Inc. released Red Hat Linux version 7.3, a highly configurable OS designed for deployments ranging from games and personal productivity to file, print and web …

Upcoming security conferences in 2002

Conference: 14th Annual Computer Security Incident Handling Conference (FIRST 2002) Date: June 24-28, 2002 Place: Hilton Waikoloa Village, Hawaii URL: The FIRST conference …

Remote Timing Techniques

This paper describes remote timing techniques based on TCP/IP intrinsic operation and options. The techniques are used for careful observation of the TCP/IP data stream to …

Anti-Trojan and Trojan Detection with In-Kernel Digital Signature testing of Executables

This paper presents a somewhat compute expensive way to detect or deny the activity of Trojan or otherwise modified executable files that may have been tampered with in any …

Know Your Enemy: Passive Fingerprinting

This paper details how to passively learn about the enemy, without them knowing about it. Specifically, how to determine the operating system of a remote host using passive …

Know Your Enemy: Worms at War

See how worms probe for and compromise vulnerable Microsoft Windows systems. Based on the first Microsoft honeypot compromised in the Honeynet Project. Read the paper in HTML …

Know Your Enemy: Motives

This paper studies the motives and psychology of the black-hat community, in their own words. Read the paper in HTML format here.

Know Your Enemy: A Forensics Analysis

This paper studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we focus on our analysis techniques and how we …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools