August 2005
-
August 18, 2005
18
Aug'05
How to configure an FTP server with SSL
In this expert response, security expert Michael Cobb explains how to securely configure an FTP server with Secure Socket Layering (SSL). Continue Reading
-
August 18, 2005
18
Aug'05
Authenticating Web applications to SQL
Learn how to securely authenticate Web applications to various databases. Continue Reading
-
August 18, 2005
18
Aug'05
Where have all the hackers gone?
The term "hacker" runs the gamut from computer enthusiast to criminal, depending on who you ask. In this comedic, stream-of-conscience column, James Foster asks, "Am I a hacker?" Continue Reading
-
August 18, 2005
18
Aug'05
Security Bytes: Symantec deal for Sygate worth up to $200m
Also in the news, Apple withdraws large security update; Florida man faces prison for massive data theft; Adobe issues critical PDF patch; and NIST eyes iris scanning capabilities. Continue Reading
-
August 17, 2005
17
Aug'05
Worms targeting Windows Plug and Play go global
Organizations around the world are being hit hard by multiple worms. Corporate networks are most at risk. Continue Reading
-
August 17, 2005
17
Aug'05
Creating an antispam cocktail: Best spam detection and filtering techniques
There are three spam detection/filtering techniques that should be incorporated in any antispam cocktail. Continue Reading
-
August 17, 2005
17
Aug'05
How to protect your network from the Plug and Play exploits
Security experts offer practical advice to reduce the risk of your company's networks being infected by a variety of malicious code now circulating. Continue Reading
-
August 16, 2005
16
Aug'05
How to perform a bug sweep
Learn why many corporations have started to perform bug sweeps or Technical Security Counter Measure (TSCM) operations, and five basic technologies used by TSCM operators. Continue Reading
-
August 16, 2005
16
Aug'05
UPDATED: More malcode targets Windows Plug and Play flaw
Zotob is up to three variants targeting the Plug and Play flaw and exploit watchers say it may be to blame for network outages at Capitol Hill, CNN, The New York Times and ABC. Continue Reading
-
August 15, 2005
15
Aug'05
Logging Windows administrators
How can all actions from Windows administrators be securely logged? Expert Michael Cobb discusses. Continue Reading
-
August 15, 2005
15
Aug'05
OPatch, wherefore art thou?
You think the Oracle patching utility installed the latest critical patches, but you may still be vulnerable -- and non-compliant with federal regulations. Continue Reading
-
August 15, 2005
15
Aug'05
Managing patch installations
Learn how using batch file utilities can help control Microsoft patch installations. Continue Reading
-
August 14, 2005
14
Aug'05
UPDATED: Zotob exploits Microsoft Windows flaw
Security experts are worried by how fast Zotob was developed to exploit Microsoft Windows' Plug and Play flaw. A more damaging worm could be launched with equal speed. Continue Reading
-
August 12, 2005
12
Aug'05
The exploits of August
Experts warn of a bad month because of new vulnerability exploits and the tendency for attackers to strike in August. Users weigh in on the facts vs. FUD. Continue Reading
-
August 12, 2005
12
Aug'05
Security Bytes: Several new Bagle variants on the march
In other news: Exploit s targets Veritas backup agent; the underground has a HoneyMonkey on its back; phishers use fax machines now; and FBI looks at a new computer system. Continue Reading
-
August 10, 2005
10
Aug'05
IIS vs. Apache: Which is the right security choice?
From vulnerabilities to administrator and developer skills, this tip analyzes the risks and benefits to weigh when selecting the right Web server for your organization. Continue Reading
-
August 10, 2005
10
Aug'05
Hybrid honeypots 'shadow' intrusion prevention systems
The new technology improves anomaly detection accuracy and relieves some of the headaches with current IPS and IDS tools. But it has its shortcomings. Continue Reading
-
August 10, 2005
10
Aug'05
Will Microsoft cut into security sector's bottom line?
Recent revenue reports show security firms continuing to cash in on heightened threat concerns. But one analyst says Microsoft could end the "gravy train." Continue Reading
-
August 09, 2005
09
Aug'05
How to ethically monitor an employee's e-mail
Learn why companies who plan to monitor their employees' e-mails should have a acceptable use policy. Continue Reading
-
August 09, 2005
09
Aug'05
Continuing education options, part 2: A new and improved way to submit (ISC)2 CPEs
An overview of (ISC)2's CPE Submission Program, including how to submit CPEs and the benefits of Trusted CPE Provider Submissions. Continue Reading