Home > Articles > Security

Security

722 Items

Sort by Date | Title

Interview with Security Expert Avi Rubin
Sep 28, 2001
Avi Rubin, author of the book White-Hat Security Arsenal: Tackling the Threats (Addison Wesley, 2001), talks to InformIT about online shopping, e-voting, and why viruses and worms are becoming more prevalent.
Silence of the Worms
Sep 28, 2001
Ed Skoudis paints a dramatic picture of how worm attacks and security mistakes can jeopardize an organization in this article’s Silence of the Worms scenario.
Thwarting the System Cracker
Sep 28, 2001
Most crackers use similar tricks to break into your system. The good news is that you can guard your system by learning about these tricks. Marcel Gagné shows you how to avoid leaving the door to your system wide open.
Tips for Dealing with Insider Security Threats
Sep 28, 2001
Insider attacks not only outnumber external attacks, but their damage also costs companies more. Ed Skoudis offers some tips to ward off insider attacks in this article.
Vulnerability-Scanning Tools
Sep 28, 2001
Vulnerability scanners look for holes in the armor of the target machines. Ed Skoudis tells how these tools can help you locate your system weaknesses and find any security holes before the hackers do.
A Comparison of Dial Backup Approaches
Sep 21, 2001
This article discusses three popular mechanisms for implementing a dial backup solution for improving network availability, highlighting the benefits and drawbacks of each approach.
Authentication
Sep 21, 2001
Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
Configuration for Transparently Redundant Firewalls
Sep 21, 2001
It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
Dial Backup for IPSec Tunnels
Sep 21, 2001
Network availability in a VPN environment can be significantly enhanced through support of redundant communications links, either in the form of VPNs through other ISPs or, as discussed in this article, via dial backup.
Managing the Patchwork Mess
Sep 21, 2001
Keeping up with the latest software patches can lessen your chances of being hacked. In this article, Mandy Andress tells how to go about locating, testing, installing, and managing the right patches for your system.
Personal Firewalls
Sep 21, 2001
To enable remote access, you need protection for end users, especially if they're using a VPN over a broadband Internet connection. Mandy Andress delves into the realm of personal firewalls in this article.
Remote Access Technologies
Sep 21, 2001
Mandy Andress gives you the low-down on remote access technologies, including dial-up, SSH, remote management, and terminal services.
Wireless LAN Security
Sep 21, 2001
In the next few years, a significant number of wireless LANs will be deployed or expanded. Mandy Andress looks at the major issues of wireless LANs in this article, including standards, security, mobility, and cost-effectiveness.
Risks of the Passport Single Signon Protocol
Sep 2, 2001
Although the Passport single signon protocol enables users to sign on to multiple Web sites by authenticating only once, it's not without its risks. In this article, David Kormann and Aviel Rubin look at Passport's flaws and suggest improvements.
Encrypting E-Mail Data
Aug 27, 2001
The GNU Privacy Guard's quick-and-dirty encryption capabilities have made it an international success with many popular e-mail clients. In this article, Aron Hsiao teaches you how to use this tool for encrypting e-mail.
Windows 2000 Port Forwarding: How to Put Your Mail Server Behind Your Firewall
Aug 6, 2001
Your internal network is as safe as you can make it from intruders. But what if YOU want to "intrude"?
Building a Roadmap for Securing Your Enterprise
Jul 13, 2001
This sample chapter equips you with a roadmap for surviving the information security onslaught.
X.509 Public Key Certificates
By William Stallings
Jul 13, 2001
Bill Stallings explains the central role of public key certificates in e-commerce and other secure apps.
Securing Sockets with OpenSSL (Part 1)
Jul 6, 2001
This article defines privacy issues and options for transmitting secure information across the Net. (Part 1 of 2)
Securing Sockets with OpenSSL (Part 2)
Jul 6, 2001
Sean Walton concludes this series on message security with OpenSSL, a production-ready SSL library.

<< < Prev Page 33 34 35 36 37 Next >