Email Alerts
-
VirusTotal: On-demand antivirus service scans malicious files
When several AV scanners are installed on the same system, they are notorious for stepping all over each other. Fortunately, the resources of more than 30 antivirus scanner engines are just a Web-click away. Contributor Scott Sidel explains. Tip
-
What kinds of network packet data can be extracted from Snort IDS?
Snort IDS may be able to track information on received network packets, but network security expert MIke Chapple explains what the intrusion detection system is best used for. Ask the Expert
-
Will new Sulley framework take fuzzing to next level?
Pedram Amini, head of TippingPoint's security research group, has been busy with Aaron Portnoy, touting a new tool for functional protocol testing (also known as "black-box testing" or "fuzzing,"). He co-wrote the recently-released book "Fuzzing: Bru... Interview
-
Shining a spotlight on rootkits
In this tip, contributor Scott Sidel discusses rootkit attacks, and unveils several free software tools that can help to assist security professionals in the rootkit detection process. Tip
-
Can Snort be configured with a FreeBSD router?
Just because you can use Snort, it doesn't necessarily mean that you always should. In this expert Q&A, Mike Chapple explains which network configuration scenarios call for the intrusion defense tool and which ones don't. Ask the Expert
-
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Article
-
Fuzzing: Brute Force Vulnerability Discovery
In this Chapter 21 excerpt from "Fuzzing: Brute Force Vulnerability Discovery," authors Michael Sutton, Adam Greene, and Pedram Amini examine SPIKE, one of the most popular and widely used fuzzing frameworks. Book Chapter
-
Immunity releases new exploit-writing tool
Pen testing company Immunity says its Debugger tool offers researchers a new way to write exploits, analyze malware and reverse engineer binary files. Article
-
Buy vs. build: Choosing an enterprise intrusion detection system
When it comes to intrusion detection systems, should you buy or build? In this SearchSecurity.com Q&A, network security expert Mike Chapple explains when an enterprise should use a commercially supported product. Ask the Expert
-
Closing the case on network firewall security with IPCop
With new threats constantly evolving, the basic network firewall is in dire need of a serious makeover. But finding a firewall that includes a plethora of security features without breaking the budget isn't always easy. In this tip, contributor Scott... Tip
Security Management Strategies for the CIO