Email Alerts
-
Podcast: Tor peer-to-peer privacy could be hacked
In this edition of Security Wire Weekly, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked to track down user identities. Article
-
Sourcefire IPO could fuel Snort, users say
Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public. Article
-
Sourcefire looking to go public
The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed. Article
-
Nmap Technical Manual
By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in collabora... Learning Guide
-
Nmap and the open source debate
Upper management may be hesitant to approve the use of an open source tool, but Nmap has many benefits. This tip offers selling points to present to upper management when proposing the use of Nmap. Tip
-
Nmap parsers and interfaces
SearchSecurity expert contributor Michael Cobb continues his series on Nmap with a detailed look at Nmap parsers and interfaces. Tip
-
Logwatch: Taking the pain out of log analysis
This column reviews the benefits of Logwatch, an open source security log analysis tool. Tip
-
Interpreting and acting on Nmap scan results
As we continue our series on Nmap in the enterprise, SearchSecurity expert contributor Michael Cobb explains how to run some of the more regular Nmap scans. Tip
-
Metasploit completes license change, updates framework
The open source pen-testing platform is used nearly universally by security assessment firms -- even those that buy "competitive" products from Core, Immunity and others, but big licensing and platform changes are in the works. Column
-
Nmap: Techniques for improving scan times
As we continue our series on using Nmap in the enterprise, SearchSecurity expert Michael Cobb provides commands that will help you adjust your Nmap scan times appropriately -- whether you want Nmap to run slow and quietly, fast and furious, or somewh... Tip
Security Management Strategies for the CIO