Home > Articles > Security

Security

722 Items

Sort by Date | Title

Searching for Substance: The Road to Safe Software
Sep 3, 2004
Nigel McFarlane argues that the only useful software guarantee we're ever likely to have will follow practices seen today in the open source movement. Open source addresses the missing link in the process of making software.
Creating a Secure Development Framework
Aug 27, 2004
Business applications can be weak spots in an otherwise secure network, but in this article, Glyn Geoghegan explains how to keep your applications as secure the rest of your IT infrastructure.
Using pGINA to Authenticate Users in Microsoft Windows Environments
Aug 27, 2004
This article describes how you can use pGINA software with a variety of authentication plug-ins to authenticate users to a unified authentication scheme.
Identity Theft: Criminal Behavior Meets the Information Age
Aug 20, 2004
In our consumer culture/information society, identity is the key to getting credit, which helps with large-ticket purchases such as cars, homes, and a college education. But the free flow of information has made it easier for the seedier side of human nature to show its ugly face, as criminals get sophisticated enough to steal your very person.
Security Considerations for Website Developers
Aug 20, 2004
With so many web hosts to choose from, how do you find one that stands up to your security needs? Get the lowdown on how to find a reputable site with the right operating system and user permissions, and learn how SSL and CA certificate security should factor into your decision.
Practical Secure Hardware Design for Embedded Systems (Part 2 of 2)
Aug 13, 2004
Concluding this two-part series, Joe Grand explores more of the weaknesses that attackers may try to exploit in your embedded security systems.
Got Sender ID?
Aug 6, 2004
Everyone is sick of spam, particularly overburdened IT managers who have to deal with it on a day-to-day basis. The Sender ID initiative could ease the burden on administrators, users, company resources, and Internet infrastructure.
Practical Secure Hardware Design for Embedded Systems (Part 1 of 2)
Aug 6, 2004
Properly designing embedded security systems requires an understanding of what you are trying to protect in your product, why you are protecting it, and what types of attackers will likely target your product. In part 1 of a two-part series, Joe Grand provides a good background into the types of security technologies, mechanisms, and attacks that exist.
Setting up a Software Restriction and Wireless Network Policy with Windows 2003 Group Policy
Aug 6, 2004
Keep those unwanted applications from running on client machines and set the rules for how wireless clients operate in your Windows 2003 domain. Jesse Smith shows you how to set up a GPO with software restriction and wireless network policies for a network operating with a Windows Server 2003 server as the primary domain controller.
Summer Brings Mosquito-Borne Malware (Part 3 of 3)
Aug 6, 2004
Concluding their discussion of the spread of viruses to handheld devices, Cyrus Peikari, Seth Fogie, Jonathan Read, and David Hettel analyze a brand-new bug: the first Trojan in the wild written specifically to infect cellular phones.
Application of Denial of Service Attacks
Jul 30, 2004
Denial-of-Service (DoS) attacks can severely damage your business. In this article, Stephen de Vries explains the basics of DoS attacks, and how you can begin to protect yourself from them.
Covert Java: Obfuscating Classes
Jul 30, 2004
Obfuscation can help prevent the hacking of your Java code, but how does it work? Alex Kalinovsky explains the most common methods and how they can help protect your intellectual property in this chapter.
Setting Up, Managing, and Troubleshooting Security Accounts and Policies in Windows XP Professional
Jul 30, 2004
Vic Picinich and Ed Tittel provide sample MSCE Windows XP Professional Exam questions and detailed answers with a focus on setting up, managing, and troubleshooting security accounts and policies.
Summer Brings Mosquito-Borne Malware (Part 2 of 3)
Jul 30, 2004
Continuing their discussion of the spread of viruses to handheld devices, Cyrus Peikari, Seth Fogie, Jonathan Read, and David Hettel dissect the most recently known finding in the wild: a Symbian worm that spreads via Bluetooth.
Cisco Asks, Can Security Skills Be Certified?
Jul 23, 2004
Yusuf Hussain Bhaiji explores the value of certification in IT Security given its rapidly changing nature and offers suggestions on choosing the right certification program.
Designing Strategies for Security Management
Jul 23, 2004
With an eye towards passing the MSCE 70-298 Exam, Bill Ferguson and Ed Tittel explain the ins and outs of managing network security, and the tools that you can use to maintain security on a Windows Server 2003 Network. Included are several sample questions with detailed answers to help you prepare for the exam.
Summer Brings Mosquito-Borne Malware (Part 1 of 3)
Jul 23, 2004
This three-part series by Cyrus Peikari, Seth Fogie, Jonathan Read, and David Hettel discusses the menace of viruses for handheld devices. Part 1 catalogs mobile malware known to date.
Implementing and Managing Security for Network Communications
Jul 16, 2004
In a crunch? Taking the MSCA/MSCE exams and just can't get your head around Network Security? Check out this sample chapter for help with the ins and outs of Network security for Windows Server 2003 Network, with an eye towards the MSCA/MSCE exam. Included are some sample questions with detailed answers to help you get started.
Wireless Security
Jul 16, 2004
Tom M. Thomas explains the basics of setting up security for a wireless network. He warns technicians of the various ways in which a wireless network can be breached, and provides help in protecting against those attacks.
Security and the Management Plane, Part 2
Jul 2, 2004
Concluding his two-part series, network management specialist Stephen Morris discusses some of the more important and popular techniques for securing the management plane.

<< < Prev Page 20 21 22 23 24 Next >