Email Alerts
-
Security Bytes: Snort systems vulnerable to attack
Updated with a link to a third-party patch. Also: IBM rectifies a critical Kerberos flaw and Symantec's effort to battle against OneCare may have to wait. Article
-
Okopipi leaps in where Blue Security left off
The new user group is building an open source P2P application that sends spammers automated "unsubscribe" messages. Some call it feasible, but others believe counterattack strategies are doomed to fail. Article
-
How to install and configure Nmap for Windows
In this second installment of our Nmap Technical Manual, SearchSecurity expert Michael Cobb offers pointers on how to install and configure Nmap for Windows. Tip
-
Nmap: A valuable open source tool for network security
Open source tool Nmap is a popular choice amongst hackers and security pros alike for network mapping, port-scanning and testing for network vulnerabilities. Tip
-
SnortSnarf
SnortSnarf is a program that was designed for use with Snort, a security program used mainly with Linux networks. SnortSnarf converts the data from Snort into Web pages. It was written in Perl by Jim Hoagland of Silicon Defense. Snort is an open sour... Definition
-
Nmap 4.01 improves upon past releases
Product review: Nmap 4.01's core port-scanning engine is mature, robust and capable of scanning both IPv4 and IPv6 hosts, independent of whether or not they are protected by firewalls. Article
-
With intrusion defense vendors, one size doesn't fit all
In the final installment of our special series, Intruder Alert, a majority of IT shops say they rely on Cisco and Symantec for intrusion defense, but others say they're just as happy using free open source tools. Article
-
Sourcefire's Roesch pledges long, open source life for Snort
SAN JOSE, Calif. -- You might not expect it, but one of the security industry's most successful executives shares a house with his mother-in-law.
In fact, Martin Roesch, founder and chief technology officer of Sourcefire Inc., and inventor of th... Interview
-
Review: Safend Protector provides strong data protection
Safend Protector lets you define who can use USB ports, what those ports can be used for and who can use wireless connections. Article
-
Simplifying Nessus security scans with a spreadsheet model
In this tip, expert George Wrenn explains how to divide networks into small, manageable IP spaces and maintain Nessus data with a spreadsheet model. Tip
Security Management Strategies for the CIO