Tips
Tips
-
The many forms of executable code
This tip explains how to identify and avoid malicious executable code. Continue Reading
-
Firewall best practices
Kevin Beaver lists suggested best practices for managing your firewall in this Network Security Tip. Continue Reading
-
To chroot or not to chroot
Security experts discuss what chroot is and why it's important to the security of your systems. Continue Reading
-
Restoring SQL Server databases from .mdf files
Learn how to restore SQL Server databases from .mdf files and vaild backups tp prevent loosing your data by reinstalling and restarting your SQL server or updating system tables. Continue Reading
-
Issues to cover in a security policy
A short look at the ten areas of concern for an organization's security policy. Continue Reading
-
CRM privacy management: How you can help
In this edition of Scheier's Security Roundup, Robert Scheier explains the security admin's role in customer privacy. Continue Reading
-
Hacker tool helps identify network weaknesses
David Strom analyzes hacker tool Nmap for enterprise use. Continue Reading
-
Automating access management
Robert Scheier takes a look at access management applications. Continue Reading
-
Breaking unwanted TCP connections by modifying your route table
This tip will tell you how to inexpensively block unwanted TCP connections. Continue Reading
-
Sample security policy for end users, part one
Here is the first part of a sample security policy for end users, which can be customized to fit your needs. Continue Reading
-
The PATRIOT Act and Carnivore: Reasons for concern?
Stephen Mencik introduces the controversial PATRIOT Act and FBI surveillance tool, Carnivore. Continue Reading
-
Sample security policy for end users, part six
This is the sixth part of a sample security policy for end users that can be customized to fit your needs. Continue Reading
-
Introduction: How to strengthen authentication procedures
A discussion of strong authentication procedures. Continue Reading
-
Scripture-based passwords
Learn how you can use the Bible as a source for passwords in this tip. Continue Reading
-
Non-dictionary passwords users can remember
Here's a tip for generating creative passwords. Continue Reading
-
Passwords with symbols and numbers
This simple tip allows users to secure the password of their choice. Continue Reading
-
Theme-related passwords
User Mark Waugh offers this tip for encouraging safe passwords. Continue Reading
-
Password variations for multiple accounts
Learn to create password variations for multiple accounts with this tip. Continue Reading
-
Acronym-based passwords
SearchSecurity user Keith Langmead offers this tip for creating secure passwords using acronyms. Continue Reading
-
User-friendly and secure passwords
This tip offers two methods for creating secure and user-friendly passwords. Continue Reading
-
Mnemonic-based passwords
SearchSecurity member Mark Farrar offers an alternative method for creating passwords. Continue Reading
-
E-mail security issues
Here are some basic precautions to take to keep e-mail secure. Continue Reading
-
Firewalls: How to choose what's right for you
A Forrester analyst outlines types of firewalls on the market and deployment strategies for large and small organizations. Continue Reading
-
Pattern-based passwords: Easy to remember non-dictionary-based passwords
Here is a tip on how to generate passwords that are not found in the dictionary and are easy to remember. Continue Reading
-
Bucket Brigade
This week's Word of the Week is bucket brigade. Continue Reading
-
SonicWall: Solid as a rock
In this edition of David Strom's Security Tool Shed, David analyzes firewall appliance SonicWall. Continue Reading
-
Listing Kerberos tickets
Use the klist utility to list all tickets in a user's ticket file. Continue Reading
-
Employees: Your best defense, or your greatest vulnerability
SearchSecurity advisor Neal O'Farrell addresses employee education in this edition of the Executive Security Briefing. Continue Reading
-
Third party security tools
If security features in Solaris alone aren't enough, try some of these 3rd party tools to secure your systems. Continue Reading
-
Partition to harden Unix servers
Partitioning can help secure Unix servers. This tip discusses the process. Continue Reading
-
Netcat: A security jack of all trades?
In this edition of Strom's Security Tool Shed, David Strom evaluates Netcat. Continue Reading
-
Is Encrypt-o-matic MoJo (powerful magic) or snake oil?
This is for the "Big Iron" folks out there. No, not Heavy Metal. Big Iron! Continue Reading
-
Parasite: The word for malware in the new millennium
Read about how one user finds malware to be more parasitic in its behavior than it is under any previous descriptor. Continue Reading
-
Why not to bother renaming the administrator account
-
Application servers feed successful e-commerce
-
Security architecture for e-business
This tip explores the infrastructure you must put in place for safe e-business. Continue Reading
-
SAP Security: Authentication and single sign-on
Learn about authenticating users for SAP applications in this tip. Continue Reading
-
Developing a network security policy
-
Chief Privacy Officer: High profile, but limited demand
This is a job snapshot of a Chief Privacy Officer. Continue Reading
-
E-business security basics
Author Daniel Amor discusses the components of electronic business security. Continue Reading
-
Security considerations when creating a new user account
-
Data integrity and PKI
Sharpen up on your knowledge of data integrity and PKI. Continue Reading
-
Windows NT security tools
This article explains how to use NT's included resources to protect your network from malicious damage. Continue Reading
-
Procedures in preventing threats to information security
-
Notarization and PKI
This tip, excerpted from InformIT, discusses the PKI function of notarization. Continue Reading
-
Implementing database security and integrity
Most database applications are network-capable. This increases the need for the implementation of security. Continue Reading
-
Securing your peer-to-peer networks
P2P networks have their benefits, but watch out for the security roadblocks. Continue Reading
-
The worse of two evils -- Internal vs. external security threats
This tip compares internal and external security problems. Continue Reading
-
Planning considerations for an effective security policy
This tips lists what to ask when you're developing a security policy. Continue Reading
-
Who writes viruses?
Sophos expert tells just what he thinks about virus writers Continue Reading
-
Tales From The Crypto - Part I
-
Macro Security