Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Firewalls (Page 1 of 2)   1 2  Next >
Blocking Traffic by Country on Production Networks
A lot of the network data coming from other countries' networks is malicious -- or at best, unwanted. SecurityFocus contributor Timothy Mullen shows data from some recent filtering tests and demonstrates how to do per-country filtering on Microsoft's ISA Server.
By: Timothy M. Mullen 2008-07-16
http://www.securityfocus.com/infocus/1900

Standards in desktop firewall policies
The purpose of this article is to discuss the need for a desktop firewall policy within an organization, determine how it should be formed, and provide an example of one along with the security benefits it provides an organization.
By: Phil Kostenbader, CISSP, and Bob Donnelly, CISM, CISSP 2006-06-06
http://www.securityfocus.com/infocus/1867

Demystifying Denial-Of-Service attacks, part one
This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks.
By: Abhishek Singh, CISSP 2005-12-14
http://www.securityfocus.com/infocus/1853

Software Firewalls: Made of Straw? Part 2 of 2
Part two looks at Layered Service Provider based Trojans hidden in the protocol stack, providing stealthy communication through an open firewall port.
By: Israel G. Lugo, Don Parker 2005-06-20
http://www.securityfocus.com/infocus/1840

Software Firewalls: Made of Straw? Part 1 of 2
This article looks at design issues with software firewalls that can render them useless in several ways.
By: Israel G. Lugo, Don Parker 2005-06-08
http://www.securityfocus.com/infocus/1839

Software Firewalls versus Wormhole Tunnels
This article explains how the PCAP library on Windows can be used to render software firewalls and client VPN environments ineffective, easily bypassing traditional security measures.
By: Bob Rudis and Phil Kostenbader 2005-05-04
http://www.securityfocus.com/infocus/1831

The Perils of Deep Packet Inspection
This paper looks at the evolution of firewall technology towards Deep Packet Inspection, and then discusses some of the security issues with this evolving technology.
By: Dr. Thomas Porter 2005-01-11
http://www.securityfocus.com/infocus/1817

Packet Crafting for Firewall & IDS Audits (Part 2 of 2)
This article is the second of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques.
By: Don Parker 2004-07-19
http://www.securityfocus.com/infocus/1791

Packet Crafting for Firewall & IDS Audits (Part 1 of 2)
This article is the first of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques.
By: Don Parker 2004-06-28
http://www.securityfocus.com/infocus/1787

Transparent, Bridging Firewall Devices
This article examines the concept of a transparent or bridging firewall which sits hidden in-line with the network it protects.
By: Matthew Tanase 2003-10-15
http://www.securityfocus.com/infocus/1737

Firewalls (Page 1 of 2)   1 2  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus