|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
MRTG for Intrusion Detection with IIS 6This article explains how to use a Multi Router Traffic Grapher (MRTG) to see the big picture of your network traffic and to help visually spot attacks. 2003-08-18 http://www.securityfocus.com/infocus/1721
Forensic Log Parsing with Microsoft's LogParserThe purpose of this article is to demonstrate log file forensics for IIS using SQL queries with Microsoft's LogParser tool. 2003-07-18 http://www.securityfocus.com/infocus/1712
Auditing Web Site Authentication, Part TwoThis is the second part of a two-part series discussing a standard audit procedure consisting of a list of questions to test Web site authentication schemes. 2003-05-05 http://www.securityfocus.com/infocus/1691
Auditing Web Site Authentication, Part OneThis is the first part of a two-part article discussing a standard audit procedure consisting of a list of questions to test Web site authentication schemes. 2003-04-24 http://www.securityfocus.com/infocus/1688
Remote Desktop Management Solution for MicrosoftOne of the many challenges facing Microsoft administrators is how to manage remote systems in a secure manner? In the world of the UNIX the answer is quite simple: using the SSH protocol. Unfortunately, providing secure remote access to MS Windows systems is not as easy. This article will describe the universal method of remote management that can be used to manage almost all versions of MS Windows: from Windows 95 up to XP. 2003-03-18 http://www.securityfocus.com/infocus/1677
Exchange 2000 in the Enterprise: Tips and Tricks Part ThreeThis is the second installment in a two-part series on securing Exchange 2000 in the enterprise. The last segment addressed the security ramifications of publishing mail content to the Internet via Outlook Web Access. This installment will discuss configuring IPSec between front-end and back-end OWA Servers as well as headers. 2003-02-20 http://www.securityfocus.com/infocus/1668
Exchange 2000 in the Enterprise: Tips and Tricks Part TwoThis is the second installment in a two-part series on securing Exchange 2000 in the enterprise. In the first part, we finished up building a messaging infrastructure that handled many of the issues mail administrators must contend with. This segment will address the security ramifications of publishing mail content to the Internet via Outlook Web Access. 2003-01-15 http://www.securityfocus.com/infocus/1658
Exchange 2000 in the Enterprise: Tips and Tricks Part OneIn this two-part article we will discuss an alternate configuration in which we will utilize Microsoft's Internet Security and Acceleration (ISA) Server, a third party SMTP Gateway (Trend Micro's Internet Messaging Security Suite) and Exchange 2000. This sort of configuration is flexible enough to be used in smaller installations that do not use a DMZ, or as part of the DMZ configuration itself. 2003-01-02 http://www.securityfocus.com/infocus/1654
Microsoft Baseline Security Analyzer V1.1Earlier this month, Microsoft released version 1.1 of the Microsoft Baseline Security Analyzer (MBSA). This article will offer a brief overview of MBSA. 2002-12-19 http://www.securityfocus.com/infocus/1649
Secure Programming with .NETAt the core of Microsoft's .NET initiative is the goal of interconnecting businesses, users, applications, and data. In this article, we will provide an overview of .NET framework security features and provide practical tips on how to write secure code in the .NET framework. More importantly, we will discuss which pitfalls to avoid. 2002-11-26 http://www.securityfocus.com/infocus/1645 |
|
Privacy Statement |