Home > Articles > Security

Security

722 Items

Sort by Date | Title

Asymmetric Cryptography
Dec 19, 2003
Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
Integrating Smartcard and Secured Access Technologies in Windows Server 2003
Dec 12, 2003
Smartcards and other security hardware have been around for several years but have been adopted slowly due to perceived difficulties in implementation. Windows Server 2003 has made the deployment of such security devices much more straightforward. The authors of "Microsoft Windows Server 2003 Insider Solutions" explain how to use Smartcards and other secured access technologies.
Securing Cisco Routers
Dec 12, 2003
Learn the different ways you can provide additional security to your Cisco network by setting up encrypted passwords, turning off all unwanted services, configuring different access levels, and using different access lists to filter all unwanted traffic out of your network and mitigate spoofing and DoS threats.
Trojan Horses
Dec 12, 2003
Malware expert Ed Skoudis discusses Trojan horses, which are computer programs that appear to be benign, but really include hidden malicious code. He outlines different types of Trojan Horses and how to protect against them.
J2EE Security
Nov 26, 2003
This chapter from "Java™ 2 Platform, Enterprise Edition: Platform and Component Specifications" describes the security requirements for the Java™ 2 Platform, Enterprise Edition (J2EE).
Cisco VPN 3000 Concentrator Hardware
Nov 13, 2003
It is important to understand the hardware aspects of the Cisco VPN 3000 Concentrator hardware series. David Minutella explains what you'll need to know about them to pass the CCSP CSVPN Exam.
Security in Microsoft IIS
Nov 13, 2003
Microsoft's IIS has earned a reputation for being relatively insecure. In this sample book chapter, you'll learn what you can do to make sure your own server isn't at risk, from Passport.NET Authentication to setting the identity of Worker Processes.
What Bill Gates Says About Security
Nov 13, 2003
Microsoft product managers at the PDC hammered home the idea that code has to get better, and that buffer overruns are caused, basically, by sloppy programming. But Bill Gates said, "You don't need perfect code to avoid security problems." Not if you use firewalls and keep your software up to date.
Basics of the PIX Firewall
Nov 7, 2003
There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
Responding to Customer's Security Incidents--Part 3: Following Up After an Incident
Oct 31, 2003
The third in a five-part series, this article focuses on following up after an incident and presents the best practices that should be executed in the follow-up phase.
Using Smartcards in Windows Server 2003/XP
Oct 17, 2003
Worried about password authentication security on your Microsoft Windows network? With Windows Server 2003 and Windows XP, you can get smart cards working for you faster than ever before.
Maintaining Security by Implementing, Managing, and Troubleshooting Service Packs and Security Updates
Oct 10, 2003
Roberta Bragg helps you learn the tools and methods necessary to keep systems patched, how to troubleshoot the problems the patches may cause, and understand the reasons tools may not work correctly.
Expressing Security Protocol Goals
Sep 26, 2003
This chapter considers how authentication and secrecy properties can be captured by enhancing CSP descriptions of protocols with the introduction of "specification events" into the descriptions of honest agents.
Securing Sun Linux Systems: Part II, Network Security
Sep 26, 2003
The second in a two-part series, this article provides recommendations for securing the Sun Linux 5.0 operating system.
UNIX Security 101
Sep 26, 2003
"What do you mean we have no logs and we must rebuild systems from scratch? We have a firewall! Isn't that enough?" The answer, of course, is "no." John Traenkenschuh examines some key UNIX security issues by walking you through a UNIX security investigation.
Working with Snort Rules
Sep 19, 2003
Learn how to work with Snort rules to ensure the security of your system.
Dissecting Snort
Sep 12, 2003
Learn the function of the internal components of Snort to help you customize the system to your network and help you avoid some of the common Snort pitfalls.
Security Scanning with Nessus
Aug 29, 2003
Nessus, an open source security assessment tool, offers a powerful solution for administrators who want to secure their environment before a security breach happens.
Basic Cisco IOS Software and Catalyst 3550 Series Security
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
Application Security for Visual C++.NET Developers
Jul 18, 2003
It's one thing to say you'll build secure applications, another thing entirely to know how to do so. Learn the basic techniques for improving the security of your .NET applications.

<< < Prev Page 23 24 25 26 27 Next >