Access "A little betrayal: Windows purists using Linux security features"
This article is part of the April 2004 issue of Depth charge: Survey shows big spending on defense in depth
In cyberspace, there are two kinds of people: Windows enthusiasts and Linux enthusiasts. Both are steadfastly loyal and will fiercely defend their chosen platform. I have a message for my Windows-purist friends: You can use Linux to enhance your security without compromising your allegiance to Redmond. As much as I'd like to, I'm not advocating that you replace your Windows infrastructure. Instead, I'll show you how you can enhance the security of your Windows environment by adding a Linux machine to run free, open-source, best-of-breed security tools -- namely Snort, Nessus and nmap. For optimum security in a Windows environment, you need to install one of those dreaded Linux boxes. These tools are widely used on both Linux and Windows platforms to enumerate, monitor and secure systems and networks. But, as I see all too often, Windows people mistakenly insist on trying to run these applications on Windows machines. Although the open-source Snort IDS can run on Windows, it's faster and more stable on its native *nix. Whether you use it as your primary ... Access >>>
Premium Content for Free.
IT security spending 2004: Firms diversify as security budgets tighten
by Andrew Briney
Fearing the worst on IT security spending, companies are diversifying their security spending.
Audit failure: How one lab raised IT security awareness and its audit grade
by Anne Saita
Learn how Argonne National Lab raised IT security awareness and its audit grade from 'F' to 'A'.
- IT security spending 2004: Firms diversify as security budgets tighten by Andrew Briney
The future of software security vulnerabilities
by Gary McGraw & Greg Hoglund
The evolution of software security vulnerabilities opens new vistas for business... and the bad guys.
Ensure audit success with sound security audit procedures
by George Wrenn
A security review doesn't have to be a sink-or-swim proposition.
- The future of software security vulnerabilities by Gary McGraw & Greg Hoglund
Using tax depreciation to increase security budgets
by Lawrence Walsh
The depreciation of capital assets, such as security hardware and software, is a tax benefit that every infosec manager should take into consideration.
Cyberwar myths: Are cyberwarfare and cyberterrorism overblown?
by Marcus J. Ranum, Contributor
Marcus Ranum explains why the whole notion of cyberwarfare is a scam.
A little betrayal: Windows purists using Linux security features
by Jay Beale
Jay Beale explains how Windows purists can leverage Linux security features without compromising their allegiance to Redmond.
Database security tools for preventing SQL injection attacks
by Pete Lindstrom, Contributor
An emerging breed of database security tools is helping security teams spot attackers' favorite techniques, like SQL injection.
In enterprises, proactive information security finally taking hold
by Andrew Briney
Editorial director Andrew Briney says frustration with failure is driving proactive information security spending on new technologies.
- Using tax depreciation to increase security budgets by Lawrence Walsh
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...