Expert analysis
Unverified Fields – A Problem with Firewalls & Firewall Technology Today
The following problem (as discussed in this paper) has not yet been identified. Certain firewalls today, will not authenticate the validity of certain protocol fields, within …
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to …
Survey 2000 – Security Focused
New research confirms that corporations are spending more and more money on securing their digital information, but cybersecurity breaches continue to climb anyway. According …
Quantum Cryptography
This tutorial will give you a basic idea about quantum cryptography. Download the tutorial in ZIP format here.
Mail Abuse Prevention Organization stands up to giant Harris Interactive
Mail Abuse Prevention System, the Redwood City based anti-spam organization, says that it will vigorously defend the law suit filed by online market research giant Harris …
Computer Security Weaknesses Persist at the Veterans Health Administration
In September 1998, the General Accounting Office reported that computer security weaknesses placed critical VA operations, including health care delivery, at risk of misuse …
Interpreting Network Traffic: A Network Intrusion Detector’s Look At Suspicious Events
The purpose of this paper is to discuss interpretations of selected network traffic events from the viewpoint of a network intrusion detection analyst. I assume the analyst …
Building a Bastion Host Using HP-UX 11
A bastion host is a computer system that is exposed to attack, and may be a critical component in a network security system. Special attention must be paid to these highly …
Network Intrusion Detection of Third Party Effects
The main goal of this paper is to familiarize the reader with reactions and responses from innocent victims, who may be subject to reconnaissance or denial of service. If a …
DNS Security in Australia
Australian Internet security company DeMorgan released a document which is revealing the state of DNS security within Australia. The result – “Of the total number …
[ The History of MOD ] – book five
MODmodMODmodMODmodMODmodMODmodMOD ================================= MOD.book.FIVE: Who are they and where did they come from? ————- Well, it’s …
[ The History of MOD ] – book four
MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoD ================================= MOD.book.FOUR [End of ’90-1991] Two weeks before his bust, Lord Micro was introduced into the group. …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse