Call for papers
SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: email@example.com
Open Source Honeypots: Learning with Honeyd
Honeyd is an open source honeypot that is designed to be used on Unix-based operating systems, such as OpenBSD or Linux, and may soon be ported to Windows. Created and maintained by Niels Provos, the primary purpose of Honeyd is detection, specifically to detect unauthorized activity within your organization.
SQL Injection and Oracle, Part Two
This is the second part of a two-part article that will examine SQL injection attacks against Oracle databases. The first installment looked at SQL injection and how Oracle database applications are vulnerable to this attack, and looked at some examples. This segment will look at detecting SQL injection attacks and protecting against SQL injection.
SQL Injection and Oracle, Part One
This is the first article in a two-part series that will examine SQL injection attacks against Oracle databases. The objective of this series is to introduce Oracle users to some of the dangers of SQL injection and to suggest some simple ways of protecting against these types of attack.
Configuring IPsec/IKE on Solaris Part Three
This is the third article in a three-part series on configuring IPsec and the Internet Key Exchange (IKE) on Solaris hosts. The first two articles covered the basics of IPsec and IKE as well as configuring IPsec to protect traffic between two Solaris hosts. This article will discuss the configuration of an IPsec VPN tunnel between two Solaris hosts.
Configuring IPSec and Ike on Solaris, Part Two
This article is the second in a three-part series devoted to configuring IPsec and IKE for Solaris. The first installment of this series covered the underlying IPsec protocols as well as how the Internet Key Exchange (IKE) works. This installment covers configuring IPsec to protect the traffic between two Solaris hosts.
Configuring IPsec/IKE on Solaris, Part One
The IP Security Protocol (IPsec) and the Internet Key Exchange (IKE) protocol are designed to permit system and network administrators the capability to protect traffic between two systems. This article is the first of a three-part series that will examine IPsec and the key management protocol, IKE, and provide readers with an introduction on how to configure both protocols on a Solaris host.
Filtering E-Mail with Postfix and Procmail, Part Four
This is the fourth and final installment in a series on filtering e-mail with Postfix and Procmail. This installment will discuss two tools that are available for use with Procmail: Razor, an automated spam tagging and filtering tool, and SpamAssassin, a mail filter that contains hundreds of different spam tests.
Filtering E-Mail with Postfix and Procmail, Part Three
This is the third installment in a four-part series on filtering e-mail with Postfix and Procmail. The first two parts of this series focused on how you can stop receiving spam by configuring Postfix for spam prevention. This segment will introduce you to the methods of stopping spam with Procmail.
JumpStart for Solaris Systems, Part Two
Filtering E-Mail with Postfix and Procmail, Part Two
This article is the second of three articles that will help systems administrators configure SMTP daemons and local mail delivery agents to filter out unwanted e-mails before they arrive in the end-users' in-box. In this part, we will look at sender/recipient restrictions, restriction ordering, and map file naming conventions before moving on to Procmail in the final article.