|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Blocking Traffic by Country on Production NetworksA lot of the network data coming from other countries' networks is malicious -- or at best, unwanted. SecurityFocus contributor Timothy Mullen shows data from some recent filtering tests and demonstrates how to do per-country filtering on Microsoft's ISA Server. 2008-07-16 http://www.securityfocus.com/infocus/1900
Standards in desktop firewall policiesThe purpose of this article is to discuss the need for a desktop firewall policy within an organization, determine how it should be formed, and provide an example of one along with the security benefits it provides an organization. 2006-06-06 http://www.securityfocus.com/infocus/1867
Demystifying Denial-Of-Service attacks, part oneThis paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks. 2005-12-14 http://www.securityfocus.com/infocus/1853
Software Firewalls: Made of Straw? Part 2 of 2Part two looks at Layered Service Provider based Trojans hidden in the protocol stack, providing stealthy communication through an open firewall port. 2005-06-20 http://www.securityfocus.com/infocus/1840
Software Firewalls: Made of Straw? Part 1 of 2This article looks at design issues with software firewalls that can render them useless in several ways. 2005-06-08 http://www.securityfocus.com/infocus/1839
Software Firewalls versus Wormhole TunnelsThis article explains how the PCAP library on Windows can be used to render software firewalls and client VPN environments ineffective, easily bypassing traditional security measures. 2005-05-04 http://www.securityfocus.com/infocus/1831
The Perils of Deep Packet InspectionThis paper looks at the evolution of firewall technology towards Deep Packet Inspection, and then discusses some of the security issues with this evolving technology. 2005-01-11 http://www.securityfocus.com/infocus/1817
Packet Crafting for Firewall & IDS Audits (Part 2 of 2)This article is the second of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques. 2004-07-19 http://www.securityfocus.com/infocus/1791
Packet Crafting for Firewall & IDS Audits (Part 1 of 2)This article is the first of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques. 2004-06-28 http://www.securityfocus.com/infocus/1787
Transparent, Bridging Firewall DevicesThis article examines the concept of a transparent or bridging firewall which sits hidden in-line with the network it protects. 2003-10-15 http://www.securityfocus.com/infocus/1737 |
|
Privacy Statement |