Home > Articles > Security

Security

722 Items

Sort by Date | Title

Securing LDAP Through TLS/SSL: A Cookbook
Aug 16, 2002
Learn how to set up the Sun Open Net Environment (Sun ONE) Directory Server software so that it can be accessed securely from command line tools.
Unwitting Collaborators, Part 9: Steganography
Aug 16, 2002
A seemingly simple email conversation or family photo can hide devastating secret information. Learn how cyber thugs can use public web sites as vehicles for malicious communication by transmitting something that looks innocuous but contains hidden images or text.
Security Risk Analysis with OCTAVE
Aug 9, 2002
What is the biggest threat to your organization's assets, and how could this impact your future? Use the OCTAVE SM (Operationally Critical Threat, Asset, and Vulnerability Evaluation) methodology to analyze your company's risks.
Small Office Security
Aug 9, 2002
Large businesses, organizations, and even government institutions have often been targets of hackers. But have you thought that your small business may have data that's just as attractive to an intruder?
Unwitting Collaborators, Part 8: Tunneling
Aug 9, 2002
A firewall or proxy server isn't very helpful if these barriers contain easily accessed gaps through which miscreants can grab or pass information. Learn how to block the holes.
Unwitting Collaborators, Part 7: Denial-of-Service Attacks
Aug 2, 2002
Many supposedly "secure" sites - even including major Internet providers - have suffered from denial-of-service (DoS) attacks. Frank Fiore and Jean François tell you how to avoid being a victim.
Ajay Gupta on Privacy, Security, and Air Conditioning
Jul 26, 2002
Security expert and co-author of Hack I.T., Ajay Gupta gives us his take on the complex relationship between privacy and security, the growing importance of security professionals in protecting America's critical infrastructure, and the joy and pain of depending on a handheld PDA.
Developing a Continuity-of-Operations Plan
Jul 26, 2002
September 11, 2001 put a whole new spin on "rainy days" and heightened our awareness as to what really needs to be done to prepare for the unexpected. Learn about a methodology for developing an effective continuity-of-operations plan to meet any eventuality.
Six Steps to Security Awareness
Jul 19, 2002
To combat the increasing trend of security breaches, corporations often deploy a one-two punch of strict policy and new tools. But security gains frequently fall short of expectations. One critical flaw is that end users are not trained to follow the revamped policies, and remain the weakest link. This training can be a far more cost-effective way to secure an enterprise.
Unwitting Collaborators, Part 5: System and Application Vulnerabilities
Jul 19, 2002
We're all familiar with the threat of electronic viruses. But other malicious software can exploit invisible security holes in your network, applications, and even web browsers. Here's how to plug those gaps.
How Safe is a .NET Passport Account in Windows XP Professional?
Jul 12, 2002
After the heavily promoted launches of the Microsoft Passport feature and Hailstorm, Passport has come under fire for being too easy to hack for credit card and logon data. Microsoft’s relative silence is not a good sign, either.
Unwitting Collaborators, Part 4: Internal Threats
Jul 12, 2002
You’ve fully defended your organization from outside intrusions? Good. Now find out how to protect it from your own employees.
Unwitting Collaborators, Part 3: Spyware
Jul 5, 2002
How can you find malicious programs that aren't obvious? Instead of coming into your system like a big, bad bomb, they simply sit quietly like a corporate assassin and steal your information. Find out how to prevent access by this "spyware."
Communicating Securely in an Insecure Medium
Jun 28, 2002
Cyber security experts show how cryptology can protect your identity in the world of cyberspace. Learn what you need to know to thwart security breaches, ward off active and passive attacks, and avoid viruses and Trojan horses. Address the legal issues involved as you use cryptology to effectively combat attempts to cripple your system and compromise your intellectual property.
Unwitting Collaborators, Part 2: Identity Theft and Impersonation
Jun 28, 2002
An identity thief can do all sorts of damage to your organization, just by stealing odd bits of information and insinuating himself past the company's security barriers. In this article, Frank Fiore and Jean François show how you can protect against this villainy.
Raw Sockets Revisited: What Happened to the End of the Internet?
Jun 21, 2002
Could a hacker really crash the Internet? Could Windows XP be turned into a tool of mass destruction? Take a closer look at the startling alert that predicted the end of the Internet. In this article, Seth Fogie revisits the prophecy of doom surrounding the subject of Raw Sockets.
Unwitting Collaborators, Part 1: Breakdown of the Human Firewall
Jun 21, 2002
"Social engineers" can bypass a company's protections with nothing more technological than a smile. This article explains how it happens and how to prevent it.
Unwitting Collaborators: Series Introduction
Jun 21, 2002
American attitudes and behaviors make us easy targets for intruders and cyberterrorists. This article introduces a new series of studies on how to tighten up our security.
Security Essentials Toolkit: Forensic Backups
Jun 14, 2002
Master two important tools of network security with these tutorials: Symantec Ghost, which helps you work with a compromised disk drive, and the freely available dd, which provides the capability to move data from one device to another.
Secret Key Cryptography
Jun 7, 2002
Learn the basics of secret key cryptography. This excerpt discusses data-scrambling techniques used in early cryptographic systems and elaborates on the concepts employed in modern cryptosystems. It also describes well-known contemporary algorithms and discusses the security services enabled through secret key cryptography.

<< < Prev Page 27 28 29 30 31 Next >