Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Securing Citrix
May 25 2012 07:01AM
Paul Craig (paul ha cked net)
Ok, as a pen-tester who has spent a fair amount of time breaking
Citrix, and as the author of iKAT (which seems to always get used to
break Citrix), i thought it would only be fair to offer my 10cents,
and suggestions for securing Citrix.
Securing Citrix installations really comes down to defense...
[ more ]
Copyright 2010, SecurityFocus