October 2003: The best of

SearchSecurity Editorial Team

A myriad of flaws and exploits continued to make the news in October. We kept you up to speed while offering expert advice on securing your network and managing your policies. Peruse our top 10 news articles and tips for valuable resources you may have missed the first time around.

If you aren't already receiving this great content in your inbox, simply

    Requires Free Membership to View

edit your membership profile to subscribe to as much -- or as little -- as you wish.


10.) OpenSSL flaws expose systems to remote and DoS attacks
9.) Microsoft fixes object type flaw in IE
8.) Sober-A worm pretends to be virus fix
7.) Security and Sarbanes-Oxley
6.) Who's Who in Infosec: Martin Roesch
5.) New critical holes in Windows detailed
4.) Update: Exploit code targets recent RPC flaws
3.) Critical Windows, Exchange alerts issued
2.) Zero-day IE exploit just the beginning
1.) QHost-1 Trojan changes DNS settings, exploits IE


10.) Ten tips for safe computing on a public LAN
9.) Web security benchmarks
8.) Writing a security policy
7.) A reality checklist for an effective security policy
6.) Laptop security policy: Key to avoiding infection
5.) IM policy management
4.) Get the spam out of here!
3.) Security policy and employee access
2.) Security policy and the law
1.) Free network security toolkit


  • VPNs: IPSec vs. SSL
  • Security Decisions 2003
  • Alert: New RPC vulnerabilities
  • Crash Course: Snort

  • There are Comments. Add yours.

    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: