SecPapers Mode:
(Page 1 of 3)  1 2 3  Next >
Article Announcement - Anti-Virus Evasion Techniques and Countermeasures 2004-12-08
Debasis Mohanty (mail hackingspirits com)
Hi all,
This is an announcement for the publication of one of my article called
"Anti-Virus Evasion Techniques and Countermeasures" at
InfoSecWriters(http://www.infosecwriters.com/).

This article was already released at hackingspirits.com and at the FD list
on 3rd Dec, 2004 but I had to uphold the

[ more ]  [ reply ]
Computer Room Emergency: Only a Matter of Time 2004-12-02
Gideon T. Rasmussen, CISSP, CISA, CISM, CFSO, SCSA (lists infostruct net)
http://www.cyberguard.com/news_room/news_newsletter_112304emergency.cfm

Computer Room Emergency ? Only a Matter of Time
Gideon T. Rasmussen - CISSP, CISM, CFSO, SCSA

It's an infrastructure manager's worst nightmare: The computer room is
down. There are several events that can make this scenario a

[ more ]  [ reply ]
Call for paper - CTS 2005 2004-11-24
GLAUME Vincent 601594 (Vincent GLAUME ANTIGONE CEA FR)
Hi all!

Here is the Call for Paper for the security session of CTS 2005:

SPECIAL SESSION

Security and Collaboration

The 2005 International Symposium on Collaborative Technologies and Systems
(CTS'2005)

May 15 - 19, 2005
Adam's Mark Hotels & Resorts, Saint Louis, Missouri, USA

In Cooperation

[ more ]  [ reply ]
New Book on Information Security Management 2004-08-06
Steve Purser (steveapurser yahoo com)
Hi,

Just a quick message to make people aware of a new
book in the area of information security management -
"A Practical Guide to Managing Information Security",
Steve Purser, Artech House, 2004.

This is a practical book, aimed at helping managers
and technical staff implement security mechanism

[ more ]  [ reply ]
iDEFENSE Labs Whitepaper - "A Comparison of Buffer OverflowPrevention Implementations and Weaknesses" 2004-08-04
idlabs-papers idefense com
iDEFENSE Labs recently produced a technical whitepaper entitled, "A
Comparison of Buffer Overflow Prevention Implementations and
Weaknesses". This paper is the result of several months of diligent
research and was presented at the Black Hat USA 2004 and Defcon 12
computer security conferences.

Abst

[ more ]  [ reply ]
Web App Vulnerabilities Statistical Analysis WP 2004-06-28
Imperva Application Defense Center (adc imperva com)
Dear List,

Imperva(tm)'s Application Defense Center (ADC) has released a new white
paper titled "How Safe is it Out There (Zeroing in on the
vulnerabilities of application security)".

The paper, written by Moran Surf and Amichai Shulman, presents a
statistical analysis of results obtained from num

[ more ]  [ reply ]
Spammers @ Igxglobal.com 2004-06-23
Alfred Huger (ah securityfocus com)


Hello all,

I've had several people recently (well about 20 or so today actually)
complain about getting spam from Igxglobal.com, particularly security
related spam. The concern presented to me is that these people have
harvested names from public security mailing lists such as those on
Security

[ more ]  [ reply ]
Gcc Inline Assembly - How to - Released! 2004-06-16
Pablo G. Sabbatella (seguridad gmail com)
Some months ago this text was released in spanish and was greatly
useful for a lot of people, so we decided to translate it to english
=)
_____________________________________________________________
Gcc Inline Assembly - How to
By Martin Candurra (astor) available at hackemate.com.ar
< martincad@ya

[ more ]  [ reply ]
Paper - Securing Windows Laptop 2004-06-17
Arindam Mandal (arindam mandal paladion net)


Greetings to all,

I have written a paper on Securing Windows Laptops - it's available for download at: http://www.paladion.net/papers/securing_your_laptop.pdf

The paper enables laptop users to secure their system easily. It discusses the common insecurities that we generally ignore and giv

[ more ]  [ reply ]
Info Security Writers Papers Update (May) 2004-06-15
Von Spangler (staticreply yahoo com)
A special note: Check out Ed Skoudis' new Crack the
Hacker Challenge: HACKERS OF THE LOST ARK:
http://www.infosecwriters.com/lost_ark.php

ISW's PAPERS UPDATE

++++++++++++++++++++++++++++
Exploitation / Vulnerability
++++++++++++++++++++++++++++

- **MAY WINNER** Yves Younan: "An Overview of Comm

[ more ]  [ reply ]
(forw) Announcing Release of NIST Special Publication 800-60 2004-06-14
Elias Levy (aleph1 securityfocus com)
----- Forwarded message from Patrick O'Reilly <patrick.oreilly (at) nist (dot) gov [email concealed]> -----

From: "Patrick O'Reilly" <patrick.oreilly (at) nist (dot) gov [email concealed]>
Reply-To: patrick.oreilly (at) nist (dot) gov [email concealed]
To: Multiple recipients of list <compsecpubs (at) nist (dot) gov [email concealed]>
Subject: Announcing Release of NIST Special Publication 800-60
Date: Mon, 14 J

[ more ]  [ reply ]
exploit instruction code construction 2004-06-10
ari (edelkind-secpapers episec com) (1 replies)
"Exploit Instruction Code Construction: assisting the manipulation of
services on obscure operating systems"

I wrote this informal paper nearly two years ago, but it was never
publically released for various reasons. It should still be quite
useful today.

The paper discusses the creation of explo

[ more ]  [ reply ]
Re: exploit instruction code construction 2004-06-10
ari (edelkind-secpapers episec com)
Whitepaper: The need for Security Testing 2004-06-06
Chuck Fullerton (chuck cia-sec com)
Greetings All,

The Charles W. Fullerton Institute of Analysis would like to introduce our
first published Whitepaper, "The Need for Security Testing: An Introduction
to the OSSTMM 3.0".

http://www.infosecwriters.com/texts.php?op=display&id=178

Chuck Fullerton
OPST,CISSP,CSS1,CCNP,CCDA,CNA,A+
Foun

[ more ]  [ reply ]
Call for Participation Workshop DIMVA 2004 2004-05-14
thomas suse de (Thomas Biege) (1 replies)

----------------------------------------------------------------------
C A L L F O R P A R T I C I P A T I O N
----------------------------------------------------------------------
########## Early Bird Rates available before June 1, 2004 ########
--------------------------

[ more ]  [ reply ]
Info Security Writers (ISW) Papers Update (April) 2004-05-22
Von Spangler (staticreply yahoo com)
(forw) NIST Computer Security Division Released 4 Publications today 2004-05-12
Elias Levy (aleph1 securityfocus com)
----- Forwarded message from Patrick O'Reilly <patrick.oreilly (at) nist (dot) gov [email concealed]> -----

From: "Patrick O'Reilly" <patrick.oreilly (at) nist (dot) gov [email concealed]>
Reply-To: patrick.oreilly (at) nist (dot) gov [email concealed]
To: Multiple recipients of list <compsecpubs (at) nist (dot) gov [email concealed]>
Subject: NIST Computer Security Division Released 4 Publications today
Date: W

[ more ]  [ reply ]
New IT security magazine 2004-05-10
Hackademy (international dmpfrance com)
Dear List,

The Hackademy Journal is a new quarterly magazine dedicated to IT
security and "hacking". With a high technical level, this
international publication is intended for a professional audience of
programmers, system and network administrators, security specialists,
etc. who wish to understa

[ more ]  [ reply ]
(forw) Release of NIST DRAFT Special Publication 800-58 2004-05-06
Elias Levy (aleph1 securityfocus com)
----- Forwarded message from Patrick O'Reilly <patrick.oreilly (at) nist (dot) gov [email concealed]> -----

From: "Patrick O'Reilly" <patrick.oreilly (at) nist (dot) gov [email concealed]>
Reply-To: patrick.oreilly (at) nist (dot) gov [email concealed]
To: Multiple recipients of list <compsecpubs (at) nist (dot) gov [email concealed]>
Subject: Release of NIST DRAFT Special Publication 800-58
Date: Thu, 6 May 200

[ more ]  [ reply ]
RE: New Paper - SQL Injection Signatures Evasion 2004-04-26
Imperva Application Defense Center (adc imperva com)
Dear Mr. Mookhey,

The 'SQL Injection Signatures Evasion' paper is the result of a several
months-long research conducted by Imperva's ADC. This research began
long before the pulibcation of the 'Detection of SQL Injection and
Cross-Site scripting attacks', and was obviously never intended as a
mea

[ more ]  [ reply ]
Re: New Paper - SQL Injection Signatures Evasion 2004-04-26
K. K. Mookhey (cto nii co in)
This is in response to Imperva's email that it is trivial to evade
signature-based detection of SQL injection. There are a few points I'd like
to respond to in relation to their tone and content of the paper. Well first
lets take the tone:

The abstract of Imperva's paper says, among other things:
"

[ more ]  [ reply ]
A new book on the computer security 2004-04-23
gilbert nzeka (dark_khaalel yahoo fr)


I have just written a new book on the computer security available to the address http://cksecurity.free.fr/Hacking_Securite_HANDBOOK.pdf.

It treats safety of the networks, software, operating systems, algorithms cryptographic and the programming network: each technique is analyzed, explained,

[ more ]  [ reply ]
[Research Paper] DNS Cache Snooping 2004-04-22
Luis Grangeia (luis grangeia sidestep pt)
Hi,

I have written a research paper on a relatively ignored DNS issue known
as DNS Cache Snooping. This issue allows one, for instance, to query a
DNS cache to verify if a certain site has been accessed or if an email
was recently sent to a given domain.

Abstract and link below. Reader feedback an

[ more ]  [ reply ]
New Paper - SQL Injection Signatures Evasion 2004-04-19
Imperva Application Defense Center (adc imperva com)
Dear List,

Imperva(tm)'s Application Defense Center has released a new white paper.

The paper, titled 'SQL Injection Signatues Evasion', is based on
research done at Imperva's ADC, and shows that providing protection
against SQL injection using signatures alone is not enough. The paper
demonstrate

[ more ]  [ reply ]
Sombria Honeypot - Third Report 2004-04-02
snsadv lac co jp (snsadv)
Our Computer Security Lab has released a new Sombria report, which
includes a special investigation of a Brazilian hacker group.

"Operation Sombria:" An Undercover Investigation of Computer Trespassers"
http://www.lac.co.jp/security/csl/intelligence/sombria_e/smbr_3.pdf

[ more ]  [ reply ]
White Paper - Web Application Worms: Myth or Reality? 2004-03-30
Imperva Application Defense Center (adc imperva com)
Dear SecPapers List,

Imperva(tm)'s Application Defense Center (ADC) has released a new white
paper.

The new paper demonstrates the feasibility of launching worms that
attack custom Web application software automatically. These
methodologies leverage common Web search engine technologies to achieve

[ more ]  [ reply ]
Penetration Testing Report - Sample Report 2004-03-23
Imperva Application Defense Center (adc imperva com)
Dear SecPapers List,

Imperva(tm)'s Application Defense Center (formerly WebCohort Research)
has released a new paper.

This paper demonstrates a real Application Penetration Testing Report,
as should be provided at the end of an application penetration testing.
The penetration testing was performed

[ more ]  [ reply ]
Release of Rootkit Hunter 1.0.0 2004-03-21
M. Boelen (michael computerpech nl)
Hi,

After three RC's (release candidates), a lot of bug hunting and a lot of
'Big thanks'
I'm proud to present you a new release of Rootkit Hunter. This release
incorporates extra support for a operating systems like AIX, improved
support for rootkits, new 3rd party support, extra program paramete

[ more ]  [ reply ]
Discovering passwords in memory 2004-03-13
Abhishek Kumar (abhishek kumar paladion net)
Hi All,

We have released a paper on "Discovering passwords in memory" that
discusses the dangers of using plain text passwords in memory. The
vulnerability is not new, but we are seeing this in several major
applications today and would like to bring the community's attention to
it. We hope this p

[ more ]  [ reply ]
[CORRECTION] URL fixed 2004-03-11
Bob Radvanovsky (rsradvan unixworks net)
To the discussion group: I am terribly sorry about
the typographical error; the matter has been corrected.

The specific whitepapers may be found at:

WP-002: Profiling Wargamers
http://www.unixworks.com/papers/wp-002.pdf

WP-003: Hiding an IDS
http://www.unixworks.com/papers/wp-003.pdf

Non-specif

[ more ]  [ reply ]
(Page 1 of 3)  1 2 3  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus