Access "Hacking in 2003: Examining this year's hacking techniques"
Hacking into a Woman's Heart On a recent Saturday night, my girlfriend and I were perched at the bar waiting for our table when we overheard a "hacker" trying to impress his date. He was a man in his early 40s, wearing a faded purple oxford shirt with a paisley lining over a maroon turtleneck. With each drag of his Marlboro, he exposed his gapped and rotting smile. The object of his attention was a moderately attractive woman who looked as bored as George Bush at a physics lecture. Despite his nerdy confidence, he probably sensed that things weren't going well. To jumpstart the conversation, he launched into a story about his hacking prowess. This immediately caught my attention. Over the din, I caught a few gems from his boasts. "I've hacked a high school just to see if I could do it without leaving any tracks. And I've hacked a few friends' Web pages just for fun. I was just messing around with them." "Hardly anyone knows you can hack Microsoft," he said, raising the tempo of his bragging. "I could make a lot of money hacking. I could steal $80 million, ... Access >>>
Premium Content for Free.
Microsoft security improving, while Trustworthy security lacks effort
by Lawrence M. Walsh
Microsoft is making significant strides to clean up its security mess, but Trustworthy Computing still has a long way to go.
Microsoft's internal auditor discusses the company's IT security outlook
Scott Charney is Microsoft's internal auditor, see what he and his team control.
NetIQ's five-point security architecture
Even with expanded support and agents, NetIQ's SIM product remains a Windows-centric solution.
- Microsoft security improving, while Trustworthy security lacks effort by Lawrence M. Walsh
Microsoft Security Response Center revamps its patch processes
Microsoft Security Response Center revamps its advisory and patch processes.
Profile: Symantec CEO John Thompson
Symantec's CEO breaks business and cultural barriers in his drive to build a security superpower.
How to address enterprise IT security concerns with executives
Five tips to win friends and influence C-level execs in your organization.
- Microsoft Security Response Center revamps its patch processes
Next-generation security awareness training
by Andrew Briney
Put your posters and buttons away. A more effective solution is at your fingertips.
Hacking in 2003: Examining this year's hacking techniques
A look at the foibles, follies and felons of infosec in 2003.
Using HoneyD configurations to build honeypot systems
by Marcus J. Ranum, Contributor
Spoofing, diversion and obfuscation are all part of honeyd's powerful arsenal.
Detecting a Linux server hack
by Jay Beale, Contributor
Learn how to detect if your Linux server have been hacked or compromised.
Tips and tricks for IDS deployment best practices
by Jack Danahy, Contributor
Intrusion detection remains an over-hyped technology because most companies have no idea what to do with it.
- Next-generation security awareness training by Andrew Briney
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...