|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Windows Anti-Debug ReferenceThis paper classifies and presents several anti-debugging techniques used on Windows NT-based operating systems. Anti-debugging techniques are ways for a program to detect if it runs under control of a debugger. They are used by commercial executable protectors, packers and malicious software, to prevent or slow-down the process of reverse-engineering. 2007-09-12 http://www.securityfocus.com/infocus/1893
Introduction to Windows Integrity ControlThis article takes a look at the Windows Integrity Control (WIC) capabilities in Windows Vista by examining how it protects objects such as files and folders on Vista computers, the different levels of protection it offers, and how administrators can control WIC using the ICACLS command-line tool. 2007-02-02 http://www.securityfocus.com/infocus/1887
Microsoft Office Security, part twoThis article discusses Microsoft Office's OLE Structured Storage and the nature of recent dropper programs and other exploit agents, in an effort to scrutinize the workings of some of the recent MS Office exploits. Part two will then collates some forensic investigation avenues through different MS Office features. Parts of the article sample different MS Office vulnerabilities to discuss their nature and the method of exploitation. 2006-08-29 http://www.securityfocus.com/infocus/1875
Microsoft Office Security, part oneThis article discusses Microsoft Office's OLE Structured Storage and the nature of recent dropper programs and other exploit agents, in an effort to scrutinize the workings of some of the recent MS Office exploits. Part two will then collates some forensic investigation avenues through different MS Office features. Parts of the article sample different MS Office vulnerabilities to discuss their nature and the method of exploitation. 2006-08-22 http://www.securityfocus.com/infocus/1874
Strider URL Tracer with Typo PatrolThis article looks at Microsoft's free Strider URL Tracer with Typo-Patrol to help fight typo-squatters and domain parking abuse. The tool can be used to protect children from seeing inappropriate or explicit sites that they should not see, and for companies or trademark owners to scan and investigate sites that may be typo-squatting their domain(s) so that they can be investigated and/or prosecuted. 2006-06-27 http://www.securityfocus.com/infocus/1869
Lessons learned from Microsoft's MS06-013 patchThis article takes a quick look at the functionality changes in MS06-013, and then discusses the new types of deployment decisions that are being made within enterprise environments in light of this critical Microsoft security patch. 2006-04-19 http://www.securityfocus.com/infocus/1863
Windows rootkits of 2005, part threeThe third and final article in this series explores five different rootkit detection techniques used to discover Windows rootkit deployments. Additionally, nine different tools designed for administrators are discussed. 2006-01-05 http://www.securityfocus.com/infocus/1854
Windows rootkits of 2005, part twoThis three-part article series looks at Windows rootkits indepth. Part two focuses on the latest cutting edge rootkit technologies that are used to hide malicious code from security scanners. 2005-11-17 http://www.securityfocus.com/infocus/1851
Windows rootkits of 2005, part oneThis three-part article series looks at Windows rootkits indepth. Part one discusses what a rootkit is and what makes them so dangerous, by looking at various modes of execution and how they talk to the Windows kernel. 2005-11-04 http://www.securityfocus.com/infocus/1850
Collaborative endpoint security, part onePart one of this article introduces endpoint security solution technologies and proposes a collaborative approach to solving technical challenges that are commonly faced by the community. 2005-10-25 http://www.securityfocus.com/infocus/1849 |
|
Privacy Statement |