April 2005 | Archive by Month | SearchSecurity.com | Page 6

April 2005

  • Kermit

    Kermit is a popular file transfer and management protocol and suite of communications software programs with advantages over existing Internet protocols such as File Transfer Protocol and Telnet.

  • probe

    In telecommunications generally, a probe is an action taken or an object used for the purpose of learning something about the state of the network.

  • checksum

    A checksum is a count of the number of bits in a transmission unit that is included with the unit so that the receiver can check to see whether the same number of bits arrived.

  • jolt

    On the Internet, jolt is a denial of service (DoS) attack caused by a very large ICMP packet that is fragmented in such a way that the targeted machine is unable to reassemble it for use.

  • payload

    On the Internet, a payload is either: The essential data that is being carried within a packet or other transmission unit.

  • Checklist: Lock down PCs, workgroups and AD domains

    Security is often an optional component of a computer implementation. Roberta Bragg explains why good security is a must and what steps to take to enforce sound policies.

  • Tech Trivia, April 6, 2005

    Daily quiz

  • The nasty truth about spyware

    Here are some quick tips for reducing the probability of spyware infection.

  • Combat security threats with user education

    Experts say user education is the key to securing your Windows environments from viruses and spam.

  • How 20% effort can get you 80% security

    To manage risk and maintain razor-sharp security architecture, know your limits, speak the boss' language and prepare for anything.

  • Tech Trivia, April 4

    Daily quiz

  • McAfee promises new round-the-clock support

    Want to add another IT staffer to your operation? McAfee says you can have one for $35,000 a year.

  • Sick of malware? Get ready to 'unload'

    A Boston user group says its April 9 "Malware Unload-fest" will be chock full of lessons on how to find sinister code and boot it from your computers.

  • Tech Trivia, April 5, 2005

    Daily quiz

  • Spyware in the back of their minds

    IT admins list worms, insiders and regulations as top security concerns. But their investments suggest spyware is gnawing at them more than they realize.

  • Tips for securing Web-based applications

    The immense popularity of Web-based applications, such as MP3 files and IM, is posing more than productivity problems for enterprises. They also make excellent attack vectors.

  • The key to locking out mobile threats

    Learn how mobile devices can harm your network and what you can do to prevent exploits.

  • Six essential security policies for outsourcing

    Kevin Beaver outlines six essential security policies for dealing with external service providers.

  • Mobile-proofing your network

    How can you keep PDAs, cell phones and laptops from turning your network into Swiss cheese?

  • Playing with fire(walls), Question No. 9