Home > Articles > Security

Security

722 Items

Sort by Date | Title

The Ingredients to ARP Poison
Oct 18, 2002
If you think the only thing between you and the Internet is a bunch of networking equipment, think again! Using ARP spoofing attacks, a hacker can see everything you send and receive from your computer. Cyrus Peikari and Seth Fogie discuss the theory of ARP spoofing and demonstrate how this type of attack is accomplished.
VLAN Access Control Lists
By Stephen McQuerry
Oct 11, 2002
Going on the Defensive: Intrusion-Detection Systems
Oct 4, 2002
Tighten your defenses against IDS attacks by learning about the inherent weaknesses in intrusion-detection systems. Cyrus Peikari and Seth Fogie show you how to more safely implement this technology by first showing you how to attack it.
Unwitting Collaborators, Part 14: Security Vendor Survey
Sep 20, 2002
To help in strengthening your security against technical breaches emanating from both inside and outside your network, consult this list of the 10 most popular security companies and their product specifications.
Daily Security Tips from Ed Skoudis - Week of September 16, 2002
Sep 13, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
How Can You Trust the Computer in Front of You?
Sep 13, 2002
Dr. Siani Pearson examines the issues that lead us to trust — or not trust — the computers that we use every day.
Unwitting Collaborators, Part 13: The Winds of Digital War
Sep 13, 2002
This frankly terrifying scenario describes exactly how cyberterrorists can cause catastrophic damage and cost thousands of lives - without the need for guns, bombs, or even airplanes.
Web Service Security Architectures, Part I
Sep 13, 2002
Web services security architectures represent a conglomeration of different pieces of security technologies. Seshadri Gokul discusses some of the common aspects of a comprehensive Web services security architecture, including problems and challenges.
Daily Security Tips from Ed Skoudis - Week of September 9, 2002
Sep 6, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
Unwitting Collaborators, Part 12: Disinformation – Changing Web Site Contents
Sep 6, 2002
Web site defacement can have more insidious purposes than just showing off the site hacker's ability. By changing news stories, a hacker can convince readers of untrue "facts" - or even redirect them to site imposters.
Daily Security Tips from Ed Skoudis - Week of September 2, 2002
Aug 30, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
Digital Cryptography: A Subtle Art
Aug 30, 2002
Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
Trusted Computing Platforms, the Next Security Solution
Aug 30, 2002
Would you allow a complete stranger in your house if he couldn't provide an ID? Now would you let him use your computer? Learn how to trust others on the Internet and a network with this exciting technology.
Unwitting Collaborators, Part 11: DNS Poisoning and Domain Hijacking
Aug 30, 2002
What if you could fool the world into thinking that an organization's web site had been cracked, simply by redirecting Net users (invisibly) to a site that looked like the original, but defaced? The tactic is much easier than you may think.
Daily Security Tips from Ed Skoudis - Week of August 26, 2002
Aug 23, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
The Art of Social Engineering
Aug 23, 2002
Friendly, helpful, interested people are an asset to a firm. Unless those attitudes are simply designed to help a social engineer get access to private information. Learn how easy social engineering can be, and how to protect your firm against it.
Unwitting Collaborators, Part 10: System Hijacking – Worms, Viruses & Trojan Horses
Aug 23, 2002
For years, the electronic world has been inundated with both viruses and virus hoaxes, and yet we don’t seem to be learning our lesson. The top 10 viruses still in the wild all have published remedies, but most of them are continue infecting our networks. Malicious code is becoming more sophisticated and attacking more than just Windows-based machines. Learn how hackers get access with these tools, and what to do about them.
What's in a Trusted Computing Platform?
Aug 23, 2002
Learn what a Trusted Platform is (including the reason for its name), along with the various enhancements that differentiate a Trusted Platform from a conventional platform.
Daily Security Tips from Ed Skoudis - Week of August 19, 2002
Aug 16, 2002
Take a tip from Ed Skoudis, one of InformIT's most popular writers, as he shares a daily nugget of his knowledge of information security. Invest a few minutes of your day to learn something new about protecting your information assets.
Deitel Introduces the Java Cryptography Extension
Aug 16, 2002
This Deitel™ article introduces the Java Cryptography Extension, providing an example that demonstrates Password-Based Encryption. Readers should be familiar with Java and advanced Java topics.

<< < Prev Page 26 27 28 29 30 Next >