|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
SSH User IdentitiesThis article shows how to improve SSH security using public key authentication instead of, or in addition to, password authentication. 2004-11-03 http://www.securityfocus.com/infocus/1810
SSH Host Key ProtectionThis is the first in a series of articles on SSH in-depth. We start with looking at standard SSH host keys by examining the verification process to ensure you have not been the victim of an attack. 2004-10-14 http://www.securityfocus.com/infocus/1806
Securing Apache 2: Step-by-StepContinuing the very popular "Securing" series from last year, this article discusses step-by-step how to compile, install, chroot and configure a secure Apache 2 web server. 2004-06-21 http://www.securityfocus.com/infocus/1786
Solaris 10 SecurityThis article discusses the many new security features in Sun's Solaris 10 operating system, as well as Sun's holistic approach to security. 2004-04-19 http://www.securityfocus.com/infocus/1776
Dogs of War: Securing Microsoft Groupware Environments with Unix (Part 2)This article discusses the implementation of layered mail security using Unix as an MTA in front of Microsoft groupware products. Part two describes the use of Qmail, Qmail-Scanner, Clam AntiVirus and SpamAssassin. 2004-04-05 http://www.securityfocus.com/infocus/1772
Dogs of War: Securing Microsoft Groupware Environments with Unix (Part One)This article discusses the implementation of layered mail security using Unix as MTA in front of Microsoft groupware products. Part one describes the use of Sendmail, MIMEDefang and SpamAssassin. 2004-03-26 http://www.securityfocus.com/infocus/1770
Oracle Row Level Security: Part 2This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part Two. 2003-11-17 http://www.securityfocus.com/infocus/1744
Oracle Row Level Security: Part 1This paper explores the row level security feature added to Oracle 8i and above, and provides examples. One of the main uses of row level security is to allow all of a company's data to be stored in one database for different departments, or for a hosting company to store data for different companies in one database. Part One. 2003-11-07 http://www.securityfocus.com/infocus/1743
Web Security Appliance With Apache and mod_securityThis article will demonstrate how you can build your own application gateway with little effort, using open source components that are widely available. 2003-10-21 http://www.securityfocus.com/infocus/1739
Securing MySQL: step-by-stepThis article describes the basic steps which should be performed in order to secure a MySQL database against both local and remote attacks. 2003-08-28 http://www.securityfocus.com/infocus/1726 |
|
Privacy Statement |