Focus on BSD Mode:
(Page 1 of 1)  
Replicating the Gonzalez Cyber Attacks through Penetration Testing 2009-11-21
Core Security (sfa securityfocus com)
------------------------------------------------------------------------
--------
YOU'RE INVITED: IT SECURITY ON DEMAND WEBCAST

"Replicating the Gonzalez Cyber Attacks through Penetration Testing"
Register: http://www.coresecurity.com/Form/generic/campaign/SecurityFocusGonzalez
--------------------

[ more ]  [ reply ]
Administrivia X-Post: Farewell 2004-03-05
Hal Flynn (flynn securityfocus com)
Hi folks,

I'm writing to bid you all farewell. After 3 and one-half years
of work and list moderation here with SecurityFocus, today is my
final day with the company. After much soul-searching, I've opted
to take a position in the Middle East, and will be relocating there
within the next few mont

[ more ]  [ reply ]
New SecurityFocus Article 2003-06-17
Hal Flynn (flynn securityfocus com)
Honeypots: Are They Illegal? (IDS area)
By Lance Spitzner

As honeypots and their concepts have grown more popular, people have begun
to ask what legal issues could apply. The purpose of this paper is to
address the most commonly asked issues.
http://www.securityfocus.com/infocus/1703

Hal Flynn
Sym

[ more ]  [ reply ]
New Focus Areas on SecurityFocus.com 2003-06-03
Hal Flynn (flynn securityfocus com)
SecurityFocus is very pleased to announce the roll-out of two new focus
areas: Pen-Test and Firewalls. The Pen-Test focus area
(http://www.securityfocus.com/pen-test), along with its associated mailing
list, Pen-Test (http://www.securityfocus.com/archives/101) will offer a
forum for all aspects of p

[ more ]  [ reply ]
SecurityFocus Article Announcement 2003-04-15
Hal Flynn (flynn securityfocus com)
Cryptographic File Systems, Part Two: Implementation

By Ido Dubrawsky

This is the second article in a two-part series looking at cryptographic
filesystems. This article will cover implementation. The focus will be on
implementing the Microsoft's EFS under Windows 2000 and the Linux
CryptoAPI.

ht

[ more ]  [ reply ]
SecurityFocus Article Announcement 2003-04-09
Hal Flynn (flynn securityfocus com)
Steganography Revealed

By Kristy Westphal

Steganography is a means of protecting the confidentiality of data by
"hiding" it within a larger file of data. This technique can be used for
both legitimate and illegitimate purposes. This article will offer a brief
introductory discussion of steganograp

[ more ]  [ reply ]
SecurityFocus Article Announcement 2003-03-27
Hal Flynn (flynn securityfocus com)
Incident Response Tools For Unix, Part One: System Tools

By Holt Sorensen

This article is the first in a three-part series on tools that are useful
during incident response and investigation after a compromise has occurred
on a OpenBSD, Linux, or Solaris system. This installment will focus on
syst

[ more ]  [ reply ]
SecurityFocus Article Announcement - Cryptographic Filesystems: Design and Implementation 2003-03-10
Hal Flynn (flynn securityfocus com)
Cryptographic Filesystems: Design and Implementation

By Ido Dubrawsky

Cryptographic filesystems have recently come to the forefront of security.
This article will discuss some of the background and technology of
cryptographic filesystems and will then cover some example implementations
of these fi

[ more ]  [ reply ]
Article Announcement: Secure MySQL Database Design 2003-02-28
Hal Flynn (flynn securityfocus com)
Secure MySQL Database Design
By Kristy Westphal

Databases are commonly referred to the keys to the kingdom, meaning that
once they are compromised, all the valuable data that is stored there
could fall into the hands of the attacker. With this in mind, this article
will discuss various methods to s

[ more ]  [ reply ]
RE: limiting (prioritizing) traffic with ipfw2 2002-12-21
Miha Verlic (miha krneki org)

>It does, though I've fubared the syntax -- it would be 'not ${peering}'
>rather than '!${peering}'. Sorry about that.

I did try that. However, it doesnt seem to work with 'or' blocks (multiple networks) which I have listed within ${peering}
Then again, a simple shellscript pushing networks one by

[ more ]  [ reply ]
limiting (prioritizing) traffic with ipfw2 2002-12-20
Miha Verlic (miha krneki org) (2 replies)
Hello,
even though this list seems dead to me, I'm giving it a shot ;-)

I'm setting up opensource mirror, and I would like to allow 45mbit/s of outgoing bandwidth to networks (approx 40 subnets) our ISP has peerings to, and 2mbit/s of bandwidth to everyone else.

I've tried the following:

peering=

[ more ]  [ reply ]
RE: limiting (prioritizing) traffic with ipfw2 2002-12-21
Roger Seielstad (roger wiredeuclid COM) (1 replies)
RE: limiting (prioritizing) traffic with ipfw2 2002-12-22
Miha Verlic (miha krneki org)
Re: limiting (prioritizing) traffic with ipfw2 2002-12-20
Damian Gerow (damian sentex net) (1 replies)
Re: limiting (prioritizing) traffic with ipfw2 2002-12-20
Peter van Dijk (peter dataloss nl) (1 replies)
Re: limiting (prioritizing) traffic with ipfw2 2002-12-22
Miha Verlic (miha krneki org)
Administrivia: Out for a wedding 2002-10-31
Hal Flynn (flynn securityfocus com)
Hi Folks,

I'm leaving the office for a service buddy's wedding in Hawaii, and will
be out for a couple weeks.

While I'm out, I'll be moderating the list, although not daily. I wanted
to give you all a heads up, as traffic will be sporadic. I'll make my
best effort to ensure the lists are moderat

[ more ]  [ reply ]
(Page 1 of 1)  


 

Privacy Statement
Copyright 2010, SecurityFocus