For more information about the site, see the
Site Index
Guidelines for allowing outside users access
Infosec professional's liability
Former employee breaches
Infosec manager qualifications
Encryption algorithms
Firewall protection for remote users
Seeking an appliance that allows for two encryption applications
Explanation of viruses and worms
Nimda & ASP Web pages
Security differences between a LAN and WAN
Rich20.dll files left behind by Nimda
Hardware requirements for implementing a firewall
Getting rid of Nimda & FunLove
Storing a DES encryption key
The threat of Nimda to Mac users
Removing SirCam from Exchange Server and LAN
Hardened OS rated above C2
Firewall standards
Classification of Nimda
The propagation of Nimda
Securing communications between Web browser and Microsoft Terminal Server
Securing a database application
Training videos for employees
Resources for writing a security policy
Protecting data on a network
Security measures for CDs
Implementing runtime process integrity checking for Unix & Linux
Hands-on antivirus training
Threat of Nimda infection on AS400 mail server
Antivirus solution for Win2k
CMOS error
Corruption of RAID drivers by Nimda
Antivirus scanner not detecting Magistr
Ridding a system of the Kak worm
Resource for Axcent ESM
Identifying an infected server
A policy for CD burners
Resources on Layers 1 and 2
Ports used by Nimda
Files changed by Nimda
What is F-Prot?
Biometrics and credit card security
Tools for evaluating the security of Unix
Bypassing the firewall
Password shadowing across Unix platforms
Identifying malicious code in Win98
What is port scanning?
Security standards for outsourcing agreements
Information on TCP Wrapper
WTLS classes II and III
The latency of security products
Ensuring that a system is bug-free
Cleaning up Code Red on a P2P network
Protecting a Web server from external attack
What is a DNS A record
The placement of security solutions on a network
Sending suspect e-mails to someone you may have infected
Tool to list open ports
When to use PKI
Prohibiting split tunnelling
Differentiating between parameters
Security holes in JavaScript
Access restricted at port 4324
Vulnerable entrance port
Code Red -- a persistent worm
Purging the restore file
Filtering sendmail
Frame relay vs. VPNs
The difference between electronic and digital signatures
Removing an infected system from a network
Turning off port 1080
Evolution of the firewall
Opening firewall for contractor
Explanation of ports
Virus sender's intentions
Finding a Trojan horse on a home computer
Digital signatures vs. electronic signatures
How viruses spread
Persuading users to comply with e-mail security
Perimeter tests
Viruses & CMOS
Locking down Windows NT 4.0
Identifying and removing Back Orifice
PJ also answers questions submitted to the Security Policy Exchange discussion forum
SirCam remedy
The difference between a virus and a worm
What is malware?
How do mail servers work?
Generic PKI CA threat model
Port connections used by VPNs
When to approach security during a requisition
Closing a port
Possible bug in Windows NT 4.0
Managing infosec personnel
Protecting a network from revenge hacks
Dynamic Host Configuration Protocol and security
How to approach a company-wide upgrade
Disabling the option to save a password on Internet Explorer
Removing an e-mail virus
The difference between a VPN box and Firewall VPN
More