April 2005 | Archive by Month | SearchSecurity.com | Page 5

April 2005

  • Microsoft to issue 'critical' patches Tuesday

    After a patch-free March, Microsoft says to expect eight updates Tuesday to fix critical security holes in Windows, Office, MSN Messenger and Exchange.

  • Tech Trivia: April 7, 2005

    Who is the new CEO of (ISC)2?

  • Unpatched flaws behind spike in DNS poisoning

    The Internet Storm Center 'sees yellow' after receiving multiple reports about DNS cache poisoning attacks redirecting users to malicious Web sites.

  • How to remove a Trojan downloader

    In this thread from the ITKnowledge Exchange, get tips and learn how to remove a Trojan downloader, how they install themselves, how they spread and how to avoid infecting other machines on a network.

  • New mobile virus ups the ante

    Mabir-A is kin to precedent-setting Cabir but with more potential.

  • Interview: CEO to say so long to the (ISC)2

    For five years, James E. Duffy has been the face of the (ISC)2 and the CISSP certification. He'd now like to devote more time to being a husband, father and grandfather. Duffy announced in February...

  • New ideas from (ISC)2's new chief

    ORLANDO, Fla. -- Rolf Moulton, CISSP-ISSMP, CISA, CCP, has been steering the ship of the (ISC)2 for about six weeks now. But the new CEO's relationship with the security certification organization ...

  • IM/P2P threats surge ahead

    Malicious attacks against IM and P2P programs have surged since the start of the year, a consortium said in a new report.

  • signature file

    A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.

  • Quiz: Cryptography

    OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message. OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio...

  • Content Scrambling System (CSS)

    Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other de...

  • macro virus

    A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something ...

  • non-disclosure agreement (NDA)

    A non-disclosure agreement (NDA) is a signed formal agreement in which one party agrees to give a second party confidential information about its business or products and the second party agrees no...

  • one-time pad

    In cryptography, a one-time pad is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and...

  • International Data Encryption Algorithm (IDEA)

    IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland.

  • virus hoax

    A virus hoax is a false warning about a computer virus.

  • Melissa virus

    Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Ou...

  • cable modem

    A cable modem is a device that enables you to hook up your PC to a local cable TV line and receive data at about 1.5 Mbps.

  • ROT-13

    ROT-13 is the encrypting of a message by exchanging each of the letters on the first half of the alphabet with the corresponding letter in the second half of the alphabet (that is, swapping positio...

  • vandal

    A vandal is an executable file, usually an applet or an ActiveX control, associated with a Web page that is designed to be harmful, malicious, or at the very least inconvenient to the user.