- Interview with Security Expert Avi Rubin
- Sep 28, 2001
- Avi Rubin, author of the book White-Hat Security Arsenal: Tackling the Threats (Addison Wesley, 2001), talks to InformIT about online shopping, e-voting, and why viruses and worms are becoming more prevalent.
|
- Silence of the Worms
- Sep 28, 2001
- Ed Skoudis paints a dramatic picture of how worm attacks and security mistakes can jeopardize an organization in this article’s Silence of the Worms scenario.
|
- Thwarting the System Cracker
- Sep 28, 2001
- Most crackers use similar tricks to break into your system. The good news is that you can guard your system by learning about these tricks. Marcel Gagné shows you how to avoid leaving the door to your system wide open.
|
- Tips for Dealing with Insider Security Threats
- Sep 28, 2001
- Insider attacks not only outnumber external attacks, but their damage also costs companies more. Ed Skoudis offers some tips to ward off insider attacks in this article.
|
- Vulnerability-Scanning Tools
- Sep 28, 2001
- Vulnerability scanners look for holes in the armor of the target machines. Ed Skoudis tells how these tools can help you locate your system weaknesses and find any security holes before the hackers do.
|
- A Comparison of Dial Backup Approaches
- Sep 21, 2001
- This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
|
- Authentication
- Sep 21, 2001
- Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
|
- Configuration for Transparently Redundant Firewalls
- Sep 21, 2001
- It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
|
- Dial Backup for IPSec Tunnels
- Sep 21, 2001
- Network availability in a VPN environment can be significantly enhanced through support of redundant communications links, either in the form of VPNs through other ISPs or, as discussed in this article, via dial backup.
|
- Managing the Patchwork Mess
- Sep 21, 2001
- Keeping up with the latest software patches can lessen your chances of being hacked. In this article, Mandy Andress tells how to go about locating, testing, installing, and managing the right patches for your system.
|
- Personal Firewalls
- Sep 21, 2001
- To enable remote access, you need protection for end users, especially if they're using a VPN over a broadband Internet connection. Mandy Andress delves into the realm of personal firewalls in this article.
|
- Remote Access Technologies
- Sep 21, 2001
- Mandy Andress gives you the low-down on remote access technologies, including dial-up, SSH, remote management, and terminal services.
|
- Wireless LAN Security
- Sep 21, 2001
- In the next few years, a significant number of wireless LANs will be deployed or expanded. Mandy Andress looks at the major issues of wireless LANs in this article, including standards, security, mobility, and cost-effectiveness.
|
- Risks of the Passport Single Signon Protocol
- Sep 2, 2001
- Although the Passport single signon protocol enables users to sign on to multiple Web sites by authenticating only once, it's not without its risks. In this article, David Kormann and Aviel Rubin look at Passport's flaws and suggest improvements.
|
- Encrypting E-Mail Data
- Aug 27, 2001
- The GNU Privacy Guard's quick-and-dirty encryption capabilities have made it an international success with many popular e-mail clients. In this article, Aron Hsiao teaches you how to use this tool for encrypting e-mail.
|
- Windows 2000 Port Forwarding: How to Put Your Mail Server Behind Your Firewall
- Aug 6, 2001
- Your internal network is as safe as you can make it from intruders. But what if YOU want to "intrude"?
|
- Building a Roadmap for Securing Your Enterprise
- Jul 13, 2001
- This sample chapter equips you with a roadmap for surviving the information security onslaught.
|
- X.509 Public Key Certificates
-
By
William Stallings
- Jul 13, 2001
- Bill Stallings explains the central role of public key certificates in e-commerce and other secure apps.
|
- Securing Sockets with OpenSSL (Part 1)
- Jul 6, 2001
- This article defines privacy issues and options for transmitting secure information across the Net. (Part 1 of 2)
|
- Securing Sockets with OpenSSL (Part 2)
- Jul 6, 2001
- Sean Walton concludes this series on message security with OpenSSL, a production-ready SSL library.
|