Call for papers

SecurityFocus ( ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to:

Infocus: Microsoft (Page 6 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >
An Audit of Active Directory Security, Part 3
This article is the third in a series devoted to discussing security issues surrounding Active Directory, also known as AD. The first article offered a brief overview of Active Directory. The second article offered an overview of the security implications of AD's default settings. This article will offer an overview of the relationship between LDAP, SASL and Kerberos, and examine what they have to do with Active Directory Security.
By: Aaron Sullivan 2001-09-12

Spotting Intrusions: A Real-Life Scenario
By: Mark Burnett 2000-09-11

Withstanding Denial of Service Attacks
By: Mark Burnett 2000-06-27

The NT Local Administrator and Shared Passwords
By: Daniel Marvin 2001-04-02

Restrict Anonymous: Enumeration and the Null User
By: Timothy M. Mullen 2001-02-12

Dealing with Windows NT Event Logs, Part Two
By: Cory L. Scott 2000-05-01

Dealing with Windows NT Event Logs, Part One

By: Cory L. Scott 2000-04-04

Winning the Hotfix Race
By: Mark Burnett 2000-06-24

The Crux of NT Security - Phase 4
By: Aaron Sullivan 2000-12-18

The Crux of NT Security - Phase 3

By: Hal Flynn 2000-11-22

Microsoft (Page 6 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >


Privacy Statement
Copyright 2010, SecurityFocus