Home > Articles > Security

Security

722 Items

Sort by Date | Title

Securing Your Wireless PDA Connection
Mar 18, 2005
There are times a Pocket PC owner might need to use a public hotspot to check email or surf the Internet. The problem is that most wireless hotspots are vulnerable to sniffer based attacks. Seth Fogie and Cyrus Peikari provide a step by step guide that you can use to securely communicate with almost any online service.
Cracking Wi-Fi Protected Access (WPA), Part 2
Mar 11, 2005
Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
A .NET Developer's Guide to Windows Security: Understanding Protocol Transition
Mar 4, 2005
New to Windows Server 2003, Protocol Transition allows you to establish logon sessions with valid Kerberos credentials for an arbitrary domain user without knowing that user's password. This chapter discusses this new tool and its implications for network security.
Cracking Wi-Fi Protected Access (WPA), Part 1
Mar 4, 2005
In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
DoS Attacks! How to Protect Your Windows 2003 Server
Mar 4, 2005
As long as there are TCP/IP packet transmissions, those pesky DoS (denial of service) attacks are here to stay. You'd better understand how these attacks happen and learn to harden your Windows 2003 Server against them. Jesse Smith gives you information and encouragement.
Strategies of Computer Worms
Mar 4, 2005
Advances in programming have brought many conveniences to our lives, but they have also given cyber-criminals increasingly sophisticated ways to commit crimes. This chapter describes the nature and evolution of the computer worm, from simple beginning to modern Bluetooth travelling cellphone worms.
That Special Souvenir from Paris: The French Give Up Packing Explosives with Passengers
Mar 4, 2005
Until recently, a trip home from overseas might have brought you a toy surprise: a small test pack of plastic explosives (without detonator, fortunately), tucked unobtrusively into your luggage by a friendly airport security agent in France. The security team was supposed to be able to find the explosives before your kids did. But Wendy Wolfson reports that our French allies have given up this practice since one of their packages went missing.
A .NET Developer's Guide to Windows Security: Understanding Ownership
Feb 25, 2005
One of the most important components of ACL-based security in Windows is unfortunately also one of the most subtle and overlooked: ownership. Learn about ownership and its importance to security in this sample chapter.
Wireless Spam: Preparing for the Coming Blizzard
Feb 25, 2005
Wireless spam? It might not be a problem for you yet, but within a year or two, it will be! Anne Zieger has some tips on how to meet this threat head-on before it causes big hassles for your users.
A .NET Developer's Guide to Windows Security: Understanding Impersonation
Feb 18, 2005
Impersonation is one of the most useful mechanisms in Windows security. It's also fragile and easy to misuse. Careful use of impersonation can lead to a secure, easy-to-administer application. Misuse can open gaping security holes. This sample chapter will help you to use impersonation properly and effectively.
EAP Authentication Protocols for WLANs
Feb 18, 2005
This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
How Much Security Is Too Much?
Feb 18, 2005
Mathew Schwartz discusses the Institute for Security and Open Methodologies (ISECOM), which promotes practical, vendor-neutral security through open-source security methodologies.
A .NET Developer's Guide to Windows Security: Understanding Delegation
Feb 11, 2005
This chapter provides the ins and outs of delegation, the process by which a server impersonating a client attempts to use that client's credentials to access remote resources in Kerberos.
Emerging Trends in RFID
Feb 11, 2005
This chapter takes stock of where RFID technology stands today, discusses the recent innovations around RFID, and examines key factors that will influence its evolution.
Evaluating Your Firewall
Feb 11, 2005
John Traenkenschuh considers some of the basic problems confronting firewall administrators. What's the point of having a firewall, if it can't keep intruders out? And what are some of the business and networking issues that cause firewalls to fail at their duty?
A .NET Developer's Guide to Windows Security: Understanding User Profiles
Feb 4, 2005
Understanding just what user profiles are, and how they interact with the Windows registry system is key to keeping a secure system. Making sure that your programs store settings in the user-specific settings trees, rather than the program directory, will help keep passwords and other vital information secure.
systrace in OpenBSD
Jan 28, 2005
systrace is an OpenBSD tool that allows administrators to monitor, intercept, and restrict system calls. Find out how to get started using systrace in this chapter from Secure Architectures with OpenBSD.
Transport Layer and Security Protocols for Ad Hoc Wireless Networks
Jan 21, 2005
It's easy to create and maintain a transport layer for your network, but it's not so easy to keep that layer secure. This chapter will help you get started securing your transport layer.
CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
Jan 7, 2005
To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
Why Corporate Security Requires Constant Vigilance
Jan 7, 2005
Gone are the days when you could just set up a firewall, forget about it, and rest easy that your network is secure. Today, network security requires constant work to maintain a secure network.

<< < Prev Page 17 18 19 20 21 Next >