Home > Articles > Security

Security

722 Items

Sort by Date | Title

Fighting Spam and Viruses at the Server, Part IV
Apr 23, 2004
Dee-Ann and Robert LeBlanc conclude their series on weeding out the spam in your users' inboxes with this comprehensive look at the tools and tricks Windows mail administrators can use to get their incoming mail services back under control.
Infrastructure Security Practice Exam Questions
Apr 9, 2004
Memory Hygiene in C and C++ Part 3: Safe Programming with Risky Data
Apr 9, 2004
If it's a good idea to learn proper memory management skills, as Cameron Laird has suggested in his ongoing series, then you'll need to gain skill at using the tools that help you do so. In this article, you'll learn how to use a free memory debugging utility, and find out how easily it can help you solve memory problems.
Stopping Spam at the Server: Part III
Apr 9, 2004
The best approach to developing an anti-spam solution for your network is to use a combination of techniques. The LeBlancs give a darned good overview of what you need to know, with lots of specific examples.
Fighting Spam and Viruses at the Server, Part II
Mar 26, 2004
In their continuing series on spam fighting for the network administrator, Dee-Ann and Robert LeBlanc discuss the tests you perform on an E-mail message's actual content—or, more precisely, the tests that specially designed software performs for you.
Preventing Buffer Overflow In Visual C++ Applications
Mar 19, 2004
Buffer overflows are currently the most common cause of security flaws in applications. Discover the techniques that professionals use to thwart this problem in this article by John Mueller.
Fighting Spam and Viruses at the Server, Part I
Mar 12, 2004
Spam, spam, spam — entertaining for Monty Python fans, but not for Internet users. How can E-mail administrators keep it out of the company mailboxes? Dee-Ann LeBlanc and Robert LeBlanc have some useful suggestions.
Restricting Web Sites with the ISA Server Firewall Service
Mar 5, 2004
Internet Security and Acceleration Server (ISA Server) is a sophisticated firewall and web cache server. Adding ISA Server to your Windows Server 2003 installation can help to protect machines on your internal network from the depredations of crazies on the Internet.
Effective Incident Response: The Puzzle in Action
Feb 27, 2004
This chapter focuses on the operational aspects of computer incident response. The authors describe considerations that should be given to specific incident-handling procedures. This information can then be used to write computer incident policies and procedures.
Forming an Effective Incident Response Team: What's Your Mission?
Feb 20, 2004
There are numerous considerations that should be addressed during the formation of an incident response team. Then a solid foundation can be laid for the other decisions that must be made toward the completion of the team. The chapter first defines the focus and mission of the team, then moves into various operational aspects that may be considered.
Performance Forensics
Feb 13, 2004
This article draws from lessons and concepts of health care delivery to provide ideas for addressing system-performance complaints with predictable and accurate results. Specific tools from the Solaris Operating System are discussed.
Detecting DDOS and Other Security Problems
Feb 6, 2004
Some developers think the problem of DDOS attacks has no solution, but you can reduce your risk with a unique application of existing technology. John Mueller shows you how you can detect a breach in your application before it becomes a major problem, so at least you can close the door on intruders.
Memory Hygiene in C and C++: Safe Programming with Risky Data
Feb 6, 2004
Memory management is scary. It should be: A lot can go wrong—often very wrong. But a moderately experienced C or C++ programmer can learn and understand memory hazards completely. Once you have that knowledge, you should feel only confidence, not fear.
Are You Still Using RSH?
Jan 30, 2004
Running RSH is like leaving your house keys under the welcome mat. SSH offers the same convenience and functionality with far greater security, so why haven't you switched?
Securing Linux Systems With Host-Based Firewalls Implemented With Linux iptables
Jan 30, 2004
This article provides information and recommendations for securing Linux operating systems with host-based firewalls.
Securing Web Applications through a Secure Reverse Proxy
Jan 30, 2004
This article describes recommended practices for setting up the Sun ONE Proxy Server software to represent a secure content server to outside clients, preventing direct, unmonitored access to your server's data from outside your company.
Home Security and Surveillance Systems
Jan 16, 2004
This chapter provides the information you will need to know — as a home integrator or a do-it-yourselfer — for designing, integrating, and installing a home security and surveillance system.
Responding to a Customer's Security Incidents, Part 4: Processing Incident Data
Jan 9, 2004
This fourth article focuses on authenticating, preserving, and processing the incident data. Only the salient points for best practices that should be executed in processing the incident data are discussed.
DB2 Universal Database Security
Dec 23, 2003
Nine percent of the DB2 UDB V8.1 Family Fundamentals certification exam (Exam 700) is designed to test your knowledge about the mechanisms DB2 Universal Database uses to protect data and database objects against unauthorized access and modification. This chapter introduces you to the authorization levels and privileges of the DB2 Universal Database.
Hack Your Vacuum Cleaner
Dec 23, 2003
Enough with this serious business stuff. Wendy Wolfson explains creative ways to make your robotic vacuum cleaner do anything besides clean the floor.

<< < Prev Page 22 23 24 25 26 Next >