- The Ingredients to ARP Poison
- Oct 18, 2002
- If you think the only thing between you and the Internet is a bunch of networking equipment, think again! Using ARP spoofing attacks, a hacker can see everything you send and receive from your computer. Cyrus Peikari and Seth Fogie discuss the theory of ARP spoofing and demonstrate how this type of attack is accomplished.
|
- VLAN Access Control Lists
-
By
Stephen McQuerry
- Oct 11, 2002
|
- Going on the Defensive: Intrusion-Detection Systems
- Oct 4, 2002
- Tighten your defenses against IDS attacks by learning about the inherent weaknesses in intrusion-detection systems. Cyrus Peikari and Seth Fogie show you how to more safely implement this technology by first showing you how to attack it.
|
- Unwitting Collaborators, Part 14: Security Vendor Survey
- Sep 20, 2002
- To help in strengthening your security against technical breaches emanating from both inside and outside your network, consult this list of the 10 most popular security companies and their product specifications.
|
- Daily Security Tips from Ed Skoudis - Week of September 16, 2002
- Sep 13, 2002
- Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
|
- How Can You Trust the Computer in Front of You?
- Sep 13, 2002
- Dr. Siani Pearson examines the issues that lead us to trust — or not trust — the computers that we use every day.
|
- Unwitting Collaborators, Part 13: The Winds of Digital War
- Sep 13, 2002
- This frankly terrifying scenario describes exactly how cyberterrorists can cause catastrophic damage and cost thousands of lives - without the need for guns, bombs, or even airplanes.
|
- Web Service Security Architectures, Part I
- Sep 13, 2002
- Web services security architectures represent a conglomeration of different pieces of security technologies. Seshadri Gokul discusses some of the common aspects of a comprehensive Web services security architecture, including problems and challenges.
|
- Daily Security Tips from Ed Skoudis - Week of September 9, 2002
- Sep 6, 2002
- Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
|
- Unwitting Collaborators, Part 12: Disinformation – Changing Web Site Contents
- Sep 6, 2002
- Web site defacement can have more insidious purposes than just showing off the site hacker's ability. By changing news stories, a hacker can convince readers of untrue "facts" - or even redirect them to site imposters.
|
- Daily Security Tips from Ed Skoudis - Week of September 2, 2002
- Aug 30, 2002
- Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
|
- Digital Cryptography: A Subtle Art
- Aug 30, 2002
- Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
|
- Trusted Computing Platforms, the Next Security Solution
- Aug 30, 2002
- Would you allow a complete stranger in your house if he couldn't provide an ID? Now would you let him use your computer? Learn how to trust others on the Internet and a network with this exciting technology.
|
- Unwitting Collaborators, Part 11: DNS Poisoning and Domain Hijacking
- Aug 30, 2002
- What if you could fool the world into thinking that an organization's web site had been cracked, simply by redirecting Net users (invisibly) to a site that looked like the original, but defaced? The tactic is much easier than you may think.
|
- Daily Security Tips from Ed Skoudis - Week of August 26, 2002
- Aug 23, 2002
- Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
|
- The Art of Social Engineering
- Aug 23, 2002
- Friendly, helpful, interested people are an asset to a firm. Unless those attitudes are simply designed to help a social engineer get access to private information. Learn how easy social engineering can be, and how to protect your firm against it.
|
- Unwitting Collaborators, Part 10: System Hijacking – Worms, Viruses & Trojan Horses
- Aug 23, 2002
- For years, the electronic world has been inundated with both viruses and virus hoaxes, and yet we don’t seem to be learning our lesson. The top 10 viruses still in the wild all have published remedies, but most of them are continue infecting our networks. Malicious code is becoming more sophisticated and attacking more than just Windows-based machines. Learn how hackers get access with these tools, and what to do about them.
|
- What's in a Trusted Computing Platform?
- Aug 23, 2002
- Learn what a Trusted Platform is (including the reason for its name), along with the various enhancements that differentiate a Trusted Platform from a conventional platform.
|
- Daily Security Tips from Ed Skoudis - Week of August 19, 2002
- Aug 16, 2002
- Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
|
- Deitel Introduces the Java Cryptography Extension
- Aug 16, 2002
- This Deitel™ article introduces the Java Cryptography Extension, providing an example that demonstrates Password-Based Encryption. Readers should be familiar with Java and advanced Java topics.
|