Email Alerts
-
The trouble with Oracle's password security
Two researchers have exposed serious flaws in the database giant's password-hashing algorithm. The vulnerabilities could be exploited for brute-force and dictionary attacks. Article
-
Are open source databases more secure?
They may not be. But a new survey suggests more IT shops are taking an interest in open source options, partly because of security holes in mainstream databases. Article
-
Admins grapple with latest Oracle patch puzzle
As database administrators digest Oracle's supersize patch release, security experts warn of unfixed flaws and at least one exploit. Article
-
Active Directory: Keep your domain user accounts in check
Expert Derek Melber signals a warning about securing user accounts in your domain. using Active Directory. Article
-
More from SearchSecurity -- October 2005
Highlights from the October 2005 issue of Information Security magazine. Monthly Magazine Highligh
-
Active Directory getting critical look from regulators
Auditors are honing in on directory services to see if companies have internal controls now mandated by law. Article
-
link encryption (link level or link layer encryption)
Link encryption (sometimes called link level or link layer encryption) is the data security process of encrypting information at the data link level as it is transmitted between two points within a network. Definition
-
MD4
MD4 is an earlier version of MD5, an algorithm used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprin... Definition
-
MD5
MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specifi... Definition
-
MD2
MD2 is an earlier, 8-bit version of MD5, an algorithm used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fin... Definition
Security Management Strategies for the CIO