December 2005 | Archive by Month | | Page 3

December 2005

  • Service-level agreement advantages and disadvantages

    Learn about the advantages and disadvantages of service-level agreements.

  • How to prevent phishing scams and protect customers

    In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these at...

  • How to overcome Web services security obstacles

    Richard Mackey explains how to build secure Web service applications and the difference between Web service protocols and standards.

  • Secure remote access: SSH Tectia Manager

    In this review, Information Security magazine's senior technology editor examines the strengths and weaknesses of SSH's Tectia Manager.

  • ISA Server security don'ts

    Use this checklist of configuration don'ts to learn what to avoid when securing ISA Server.

  • How buffer-overflow vulnerabilities occur

    Learn about buffer-overflow vulnerabilities; how they occur, types of buffer-overflow attacks, and how hackers exploit them to gain access to secure and sensitive files.

  • How to build a user registration form

    Learn how to build a secure user registration form and some general Web-based system guidelines to guide you through the process.

  • How FTPS differs from TLS

    Take an indepth look at FTP over SSL, how it works and how it differs from TLS and other protocols

  • IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe.

  • CSOs say patch management tide is turning

    Security pros at this year's Infosecurity show say IT shops are getting better at patch management. But new threats are emerging, including flaws that never die.

  • Handling permissions in Active Directory

    In this Ask the Expert Q&A, our platform security expert discusses how Active Directory permissions are controlled specified access control lists and what tools are available to users who seek to v...

  • Security pros gain ground in the board room

    Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study.

  • How to break into security

    How do you break into security if you're fresh out of school or making a career change within IT? Learn how network admins and security newbies can acquire entry-level experience.

  • Security School Course Catalog

    A catalog of our free online security courses led by information security experts on popular security topics.

  • Two Windows patches coming, IE fix uncertain

    It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan.

  • How RSA keys differ from DH/DSS keys

    In this Ask the Expert Q&A, Michael Cobb, our application security expert explains how RSA and DH/DSS differ, examines the strengths and weaknesses of each, and, explains how to use the compressi...

  • Fighting adware with… adware

    McAfee says it wasn't aware promotional pop-ups were part of an aggressive adware campaign, as a competitor discovered. But it's vowed to find the company responsible.

  • Best practices for password protection

    Learn what a keyring is -- how it works in conjuction with passphrases to keep sensitive and personal messages secure. Also learn what practices help keep passwords protected from hackers and crack...

  • Cybersecurity policy takes cooperation, trust, experts say

    At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure.

  • New bots, worm threaten AIM network

    Security firms say a fresh wave of bots lures users into downloading malicious content. Plus a new worm variant is on the loose, cloaked as a greeting card.