Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Microsoft (Page 6 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >
An Audit of Active Directory Security, Part 3
This article is the third in a series devoted to discussing security issues surrounding Active Directory, also known as AD. The first article offered a brief overview of Active Directory. The second article offered an overview of the security implications of AD's default settings. This article will offer an overview of the relationship between LDAP, SASL and Kerberos, and examine what they have to do with Active Directory Security.
By: Aaron Sullivan 2001-09-12
http://www.securityfocus.com/infocus/1470

Spotting Intrusions: A Real-Life Scenario
By: Mark Burnett 2000-09-11
http://www.securityfocus.com/infocus/1445

Withstanding Denial of Service Attacks
By: Mark Burnett 2000-06-27
http://www.securityfocus.com/infocus/1442

The NT Local Administrator and Shared Passwords
By: Daniel Marvin 2001-04-02
http://www.securityfocus.com/infocus/1353

Restrict Anonymous: Enumeration and the Null User
By: Timothy M. Mullen 2001-02-12
http://www.securityfocus.com/infocus/1352

Dealing with Windows NT Event Logs, Part Two
By: Cory L. Scott 2000-05-01
http://www.securityfocus.com/infocus/1335

Dealing with Windows NT Event Logs, Part One

By: Cory L. Scott 2000-04-04
http://www.securityfocus.com/infocus/1334

Winning the Hotfix Race
By: Mark Burnett 2000-06-24
http://www.securityfocus.com/infocus/1328

The Crux of NT Security - Phase 4
By: Aaron Sullivan 2000-12-18
http://www.securityfocus.com/infocus/1326

The Crux of NT Security - Phase 3

By: Hal Flynn 2000-11-22
http://www.securityfocus.com/infocus/1325

Microsoft (Page 6 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus