|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Enterprise Intrusion Analysis, Part OneWe all remember the early days of intrusion-detection systems IDS was supposed to be the silver bullet that ensured the security of our enterprises against every conceivable attack. Obviously this hasnt proven to be the case. 2009-04-01 http://www.securityfocus.com/infocus/1904
Data Recovery on Linux and ext3SecurityFocus contributor Abe Getchell covers a basic technique to recover data that someone has deleted, whether accidentally or on purpose. 2008-10-03 http://www.securityfocus.com/infocus/1902
WiMax: Just Another Security Challenge?Deploying WiMax brings greater bandwidth, but also new, as well as old, security ramifications. SecurityFocus contributor Stephen Barish explores the technology behind a proposed new standard for wireless broadband communications. 2008-08-26 http://www.securityfocus.com/infocus/1901
A Guide to Different Kinds of HoneypotsTwo members of the Honeynet Project, one based in the UK and one in New Zealand, delve into the details of the different types of honeynets that are in use today. 2008-02-14 http://www.securityfocus.com/infocus/1897
Proactively Managing Security RiskThe current approach to security is based on perimeter defense and relies on firewalls, intrusion detection systems, and intrusion prevention systems. However, the increasing speed at which new exploits and attacks are being devised mandates a new layer of security that provides consistent protection rather than perpetually lagging behind the morphing tricks of hackers. 2007-11-07 http://www.securityfocus.com/infocus/1896
Aspect-Oriented Programming and SecurityAspect-oriented programming (AOP) is a paradigm that is quickly gaining traction in the development world. While several others have tied AOP to security, I aspire to raise awareness amongst my information security colleagues that AOP can have a substantially beneficial impact on application security. 2007-10-16 http://www.securityfocus.com/infocus/1895
Building Secure Applications: Consistent LoggingThis article focuses on developers and discusses how to use consistent application-layer logging along with Log4J or Log4net for the real-time detection of attacks. 2007-02-26 http://www.securityfocus.com/infocus/1888
Password Management Concerns with IE and Firefox, part twoThis two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox. The article specifically addresses IE 6 and 7 and Firefox 1.5 and 2.0. 2006-12-11 http://www.securityfocus.com/infocus/1883
Password Management Concerns with IE and Firefox, part oneThis two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox. The article specifically addresses IE 6 and 7 and Firefox 1.5 and 2.0. 2006-12-08 http://www.securityfocus.com/infocus/1882
Dynamic Linking in Linux and Windows, part twoThis article discusses the shared libraries concept in both Windows and Linux, and offers a walk through various data structures to explain how dynamic linking is done in these operating systems. The paper will be useful for developers interested in the security implications and the relative speed of dynamic linking, and assumes some prior cursory knowledge with dynamic linking. 2006-08-15 http://www.securityfocus.com/infocus/1873 |
|
Privacy Statement |