April 2005 | Archive by Month | SearchSecurity.com | Page 6

April 2005

  • Kermit

    Kermit is a popular file transfer and management protocol and suite of communications software programs with advantages over existing Internet protocols such as File Transfer Protocol and Telnet.

  • Melissa virus

    Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Ou...

  • ROT-13

    ROT-13 is the encrypting of a message by exchanging each of the letters on the first half of the alphabet with the corresponding letter in the second half of the alphabet (that is, swapping positio...

  • jolt

    On the Internet, jolt is a denial of service (DoS) attack caused by a very large ICMP packet that is fragmented in such a way that the targeted machine is unable to reassemble it for use.

  • payload

    On the Internet, a payload is either: The essential data that is being carried within a packet or other transmission unit.

  • The nasty truth about spyware

    Here are some quick tips for reducing the probability of spyware infection.

  • Combat security threats with user education

    Experts say user education is the key to securing your Windows environments from viruses and spam.

  • How 20% effort can get you 80% security

    To manage risk and maintain razor-sharp security architecture, know your limits, speak the boss' language and prepare for anything.

  • Checklist: Lock down PCs, workgroups and AD domains

    Security is often an optional component of a computer implementation. Roberta Bragg explains why good security is a must and what steps to take to enforce sound policies.

  • Tech Trivia, April 6, 2005

    Daily quiz

  • Six essential security policies for outsourcing

    Kevin Beaver outlines six essential security policies for dealing with external service providers.

  • Spyware in the back of their minds

    IT admins list worms, insiders and regulations as top security concerns. But their investments suggest spyware is gnawing at them more than they realize.

  • Tech Trivia, April 5, 2005

    Daily quiz

  • Tech Trivia, April 4

    Daily quiz

  • McAfee promises new round-the-clock support

    Want to add another IT staffer to your operation? McAfee says you can have one for $35,000 a year.

  • The key to locking out mobile threats

    Learn how mobile devices can harm your network and what you can do to prevent exploits.

  • Sick of malware? Get ready to 'unload'

    A Boston user group says its April 9 "Malware Unload-fest" will be chock full of lessons on how to find sinister code and boot it from your computers.

  • Tips for securing Web-based applications

    The immense popularity of Web-based applications, such as MP3 files and IM, is posing more than productivity problems for enterprises. They also make excellent attack vectors.

  • Mobile-proofing your network

    How can you keep PDAs, cell phones and laptops from turning your network into Swiss cheese?

  • Playing with fire(walls)

    Find out how well you know your firewall.