|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Open Source Honeypots: Learning with HoneydHoneyd is an open source honeypot that is designed to be used on Unix-based operating systems, such as OpenBSD or Linux, and may soon be ported to Windows. Created and maintained by Niels Provos, the primary purpose of Honeyd is detection, specifically to detect unauthorized activity within your organization. 2003-01-20 http://www.securityfocus.com/infocus/1659
SQL Injection and Oracle, Part TwoThis is the second part of a two-part article that will examine SQL injection attacks against Oracle databases. The first installment looked at SQL injection and how Oracle database applications are vulnerable to this attack, and looked at some examples. This segment will look at detecting SQL injection attacks and protecting against SQL injection. 2002-11-28 http://www.securityfocus.com/infocus/1646
SQL Injection and Oracle, Part OneThis is the first article in a two-part series that will examine SQL injection attacks against Oracle databases. The objective of this series is to introduce Oracle users to some of the dangers of SQL injection and to suggest some simple ways of protecting against these types of attack. 2002-11-21 http://www.securityfocus.com/infocus/1644
Configuring IPsec/IKE on Solaris Part ThreeThis is the third article in a three-part series on configuring IPsec and the Internet Key Exchange (IKE) on Solaris hosts. The first two articles covered the basics of IPsec and IKE as well as configuring IPsec to protect traffic between two Solaris hosts. This article will discuss the configuration of an IPsec VPN tunnel between two Solaris hosts. 2002-09-23 http://www.securityfocus.com/infocus/1628
Configuring IPSec and Ike on Solaris, Part TwoThis article is the second in a three-part series devoted to configuring IPsec and IKE for Solaris. The first installment of this series covered the underlying IPsec protocols as well as how the Internet Key Exchange (IKE) works. This installment covers configuring IPsec to protect the traffic between two Solaris hosts. 2002-08-29 http://www.securityfocus.com/infocus/1625
Configuring IPsec/IKE on Solaris, Part OneThe IP Security Protocol (IPsec) and the Internet Key Exchange (IKE) protocol are designed to permit system and network administrators the capability to protect traffic between two systems. This article is the first of a three-part series that will examine IPsec and the key management protocol, IKE, and provide readers with an introduction on how to configure both protocols on a Solaris host. 2002-08-15 http://www.securityfocus.com/infocus/1616
Filtering E-Mail with Postfix and Procmail, Part FourThis is the fourth and final installment in a series on filtering e-mail with Postfix and Procmail. This installment will discuss two tools that are available for use with Procmail: Razor, an automated spam tagging and filtering tool, and SpamAssassin, a mail filter that contains hundreds of different spam tests. 2002-07-25 http://www.securityfocus.com/infocus/1611
Filtering E-Mail with Postfix and Procmail, Part ThreeThis is the third installment in a four-part series on filtering e-mail with Postfix and Procmail. The first two parts of this series focused on how you can stop receiving spam by configuring Postfix for spam prevention. This segment will introduce you to the methods of stopping spam with Procmail. 2002-07-11 http://www.securityfocus.com/infocus/1606
JumpStart for Solaris Systems, Part Two2001-04-16 http://www.securityfocus.com/infocus/1601
Filtering E-Mail with Postfix and Procmail, Part TwoThis article is the second of three articles that will help systems administrators configure SMTP daemons and local mail delivery agents to filter out unwanted e-mails before they arrive in the end-users' in-box. In this part, we will look at sender/recipient restrictions, restriction ordering, and map file naming conventions before moving on to Procmail in the final article. 2002-06-26 http://www.securityfocus.com/infocus/1598 |
|
Privacy Statement |