|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Detecting SQL Injection in OracleThis paper takes the subject of SQL injection further and investigates the possibilities for the Oracle Database Administrator to detect SQL injection in the wild. 2003-07-22 http://www.securityfocus.com/infocus/1714
Securing PHP: Step-by-StepThis article shows the basic steps in securing PHP, one of the most popular scripting languages used to create dynamic web pages on the Internet. 2003-06-23 http://www.securityfocus.com/infocus/1706
Securing Apache: Step-by-StepThis article shows in a step-by-step fashion, how to install and configure the Apache 1.3.x Web server in order to mitigate or avoid successful break-in when new vulnerabilities in this software are found. 2003-05-14 http://www.securityfocus.com/infocus/1694
Introduction to Simple Oracle AuditingThis article will introduce the reader to the basics of auditing an Oracle database. 2003-04-29 http://www.securityfocus.com/infocus/1689
Cryptographic File Systems, Part Two: ImplementationThis is the second article in a two-part series looking at cryptographic filesystems. This article will cover implementation. The focus will be on implementing the Microsoft's EFS under Windows 2000 and the Linux CryptoAPI. 2003-04-14 http://www.securityfocus.com/infocus/1685
Incident Response Tools For Unix, Part One: System ToolsThis article is the first in a three-part series on tools that are useful during incident response and investigation after a compromise has occurred on a OpenBSD, Linux, or Solaris system. This installment will focus on system tools, the second part will discuss file-system tools, and the concluding article will look at network tools. 2003-03-27 http://www.securityfocus.com/infocus/1679
Cryptographic Filesystems, Part One: Design and ImplementationCryptographic filesystems have recently come to the forefront of security. This article will discuss some of the background and technology of cryptographic filesystems and will then cover some example implementations of these filesystems including Microsoft's Encrypting File System for Windows 2000, the Linux CryptoAPI, and the Secure File System. 2003-03-07 http://www.securityfocus.com/infocus/1673
Secure MySQL Database DesignDatabases are commonly referred to the keys to the kingdom, meaning that once they are compromised, all the valuable data that is stored there could fall into the hands of the attacker. With this in mind, this article will discuss various methods to secure databases, specifically one of the most popular freeware databases in use today, MySQL. 2003-02-18 http://www.securityfocus.com/infocus/1667
SunScreen, Part Two: Policies, Rules, and NATThis is the second of a two-part series looking at SunScreen, Sun Microsystem's firewall product, which provides a variety of features that allow system and network administrators to secure their networks as well as provide for remote access capabilities. This article will cover the some of the rudimentary facilities in SunScreen such as adding and removing rules, setting up a remote management station, and network address translation. 2003-02-06 http://www.securityfocus.com/infocus/1664
SunScreen, Part One: An Overview of the Sun Microsystem FirewallSunScreen is Sun Microsystem's firewall that runs under the Solaris operating system. It provides for packet filtering, authentication and data encryption as well as the creation of IPsec-based VPNs. This article is the first of a two-part series that will offer a brief overview of the implementation and administration of SunScreen. 2003-01-24 http://www.securityfocus.com/infocus/1660 |
|
Privacy Statement |