-
Windows RPC vulnerability high on list of flaws to watch
Anxious administrators have more evidence they should patch the critical Windows Remote Procedure Call flaw immediately before a worm strikes.31 Jul 2003
-
A Ph.D. or Master's degree in cryptography?
31 Jul 2003
-
A virus ate my test scores
Nineteen secondary students in West Bengal, India have an unspecified computer virus to blame for a batch of bad test scores, if you believe the education minister there.30 Jul 2003
-
July 2003: The best of SearchSecurity.com
Our top 10 news stories and tips for July 2003.30 Jul 2003
-
CERT creates incident-response certification
IT security is becoming more specialized, and the Computer Emergency Response Team has reacted with its first certification, one that addresses incident response and handling.30 Jul 2003
-
Learning more about online infosec degrees
29 Jul 2003
-
Keeping the Alligators Out of the Sewer
This excerpt is from The Backup Book: Disaster Recovery from Desktop to Data Center, written by Dorian J. Cougias and published by Schaser-Vartan Books29 Jul 2003
-
Quick Takes: F5 lassos uRoam
F5 Networks announced the acquisition of remote access SSL-VPN provider uRoam, leading off this edition of Quick Takes.29 Jul 2003
-
Windows RPC exploit code published
Security researchers in China have posted exploit code for a critical vulnerability in Windows Remote Procedure Call (RPC) to several security lists.28 Jul 2003
-
E-Commerce Security Needs
This excerpt is from Network Security: A Beginner's Guide, written by Eric Maiwald.28 Jul 2003
-
Security Models and Architecture
This excerpt is from CISSP All-in-One Exam Guide, Second Edition by Shon Harris.28 Jul 2003
-
Windows Server 2003: Shots are being fired
Some recent security vulnerabilities were discovered in MS's newest Windows OS.25 Jul 2003
-
Users want to can spam with national registry
A new study shows that people want the government to deal with spam the same way it's dealing with annoying telemarketing calls.24 Jul 2003
-
It's not what you know; it's who you... are:The identity management challenge
While somewhat of a hot topic lately, identity management is not new and is deeply engrained in our computing operations.23 Jul 2003
-
Security in the software development life cycle
Small changes in the software development life cycle can substantially improve security without breaking the bank or the project schedule.23 Jul 2003
-
Could a 'do not spam' list really stop spammers?
U.S. Sen. Charles Schumer has proposed a "do not spam" list to combat the waves of spam flooding inboxes every day. One privacy experts explains how the list would work, while a spammer attempts to...23 Jul 2003
-
Quick Takes: Sophos ships EM Reporter
Sophos begins shipping EM Reporter. Also included are items from Data Junction and Cloakware Corp.22 Jul 2003
-
Where to run LDAP
22 Jul 2003
-
Writing a security policy
An attempt to distill the often overwhelming amount of security policy information into a few concise ideas.21 Jul 2003
-
Virus protection: Prevention, detection, response
How to prevent, detect and respond.21 Jul 2003
Security Management Strategies for the CIO