Home > Articles > Security

Security

722 Items

Sort by Date | Title

Network+ Exam Cram: Networking Devices in Modern Networks
Aug 5, 2005
This chapter covers the various networking devices used in modern networks with an eye toward passing the Network+ Exam. Sample questions with detailed answers are included to help you practice.
Score List Hacking: Lessons Learned by Cheating Your Way to Number One, Part 2 of 2
Aug 5, 2005
It's bad enough that a score list hacker can thwart genuine users in their attempts to beat your game's high scores. Even worse, the hacker can create havoc on your computer, hijack it for his own personal use, or something even more nefarious. Seth Fogie concludes this series with a pointed discussion of the hazards of leaving your game unprotected and ways to prevent score list hacking. If you've never seen a covert score list chat channel, this is worth a read!
The Fundamental Reasons for Protecting Your Windows Network
Aug 5, 2005
Networks are the lifeblood of business today; they are the nervous systems of organizations across the world. They are also the world's most interesting targets to a class of criminals who would love nothing more than to deny you the services of the technology you paid for. In this introduction to their book, Steve Riley and Jesper Johansson explain how and why you should get started protecting your network.
Web Services and Contemporary SOA (Part II: Advanced Messaging, Metadata, and Security)
Aug 5, 2005
This chapter examines the relationships between the SOAP messaging framework and the various WS-* extensions in service-oriented architecture and the features that SOAP enables.
Authentication Auditing in Windows 2000
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Understanding Cisco Security Agent Components and Installation
Jul 29, 2005
In this chapter, you will continue to gain an understanding of the CSA architecture through an exploration of the agent software components, protocol communication, and installation.
Business Innovation from Israel's Masters of Espionage: The Intercept
Jul 22, 2005
In the inky darkness of the predawn hours, the Red Sea had turned choppy. The sun had yet to bathe the sea, known in Arabic as Al Bahr Al Ahmar, in its winter light. Fishing boats moored in the waters surrounded by Yemen, Saudi Arabia, and the Sudan rocked in the stormy darkness. Find out how Israeli intelligence intercepted a ship smuggling Palestinian arms in this sample chapter.
Anatomy Of A Hack—The Rise And Fall Of Your Network
Jul 1, 2005
There are myriad ways that a network can be compromised, and an administrator needs to be aware of them all (and anticipate new ways coming around the corner). This chapter will not to show how to attack something, but show how attackers take advantage of your mistakes. This will enable you to protect your network by avoiding the pitfalls attackers use.
Check Point CCSA Exam Cram: Defining Security Policy with SmartDashboard
Jul 1, 2005
This chapter will help you prepare for the CCSA exam, with a focus on SmartDashboard. Sample questions and comprehensive explanations will keep you up to date and equip you to pass the exam.
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Jul 1, 2005
In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
Host Intrusion Prevention Systems: Defense-in-Depth's Best Friend
Jul 1, 2005
Chad Sullivan takes a look at common security issues and how host Intrusion Prevention Systems (IPS) can become the most crucial piece of your corporate layered security plan.
The Latest Salvo in the Spam Wars Appears in the Blogosphere: nofollow
Jun 24, 2005
There's a new HTML attribute in town called "nofollow" that's supposed to prevent weblog spam. In this article you'll learn about weblog spam, what the "nofollow" tag is, and how it might or might not help the situation.
Protecting Your Security and Privacy with Firefox
Jun 17, 2005
Rising rates of identity theft and internet fraud mean that having a secure browser is more important than ever. For those interested in keeping their information safe, the good news is that Firefox has several important features that will help you stay secure. Find out how in this sample chapter.
Using JAAS Authentication with JBoss
Jun 17, 2005
This article shows you how to connect to an EJB application running in JBoss from a non-servlet client. And in doing so, Marcus Zarra debunks several JAAS myths. It's much easier to use than you thought!
Building a Custom JBoss Login Module
Jun 10, 2005
JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
Security Financials: The Core Element of Security Business Proposals
Jun 10, 2005
Security financials help business managers to understand how and why an IT security project costs what it does, which helps business management to understand why funds need to be allocated for IT security, and helps IT to justify their spending. This article explains the benefits of security financials, and what should be in them.
Troubleshooting Any Transport over MPLS Based VPNs
Jun 10, 2005
MPLS Layer 3 VPNs allow a service provider to provision IP connectivity for multiple customers over a shared IP backbone, while maintaining complete logical separation of customer traffic and routing information. Learn more about MPLS Layer 3 VPNs in this sample chapter from Cisco.
What's New in Cisco PIX Firewall 7.0
By David Hucaby
Jun 10, 2005
The Cisco PIX Firewall 7.0 has several new features, as well as some familiar features that have received upgrades. Find out what's new and what's improved in this article from David Hucaby.
Securing Your Wireless Network with OpenVPN
Jun 3, 2005
Wireless is great, unless your next-door neighbor is stealing your data while you work. Stefan Alpers explains a cheap preventive measure that can help you avoid intrusion and attack on your wireless network.
Slamming Spam with SpamAssassin
Jun 3, 2005
Spam is one of the biggest headaches that network administrators face on a daily basis. It slows down the system overall, eats up storage, and sometimes includes dangerous worms and other nasty programs. This chapter will help you get started with SpamAssassin, an interface that recognizes spam, and kills it dead.

<< < Prev Page 15 16 17 18 19 Next >