|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Recent Security Enhancements in NetBSDNetBSD is renowned for its focus on portability, but great care is also given to security. This paper presents the NetBSD philosophy on security, major design decisions, and its current security features. Following the discussion, current and future research is presented to provide a good look at NetBSD's direction. 2006-10-03 http://www.securityfocus.com/infocus/1878
Analyzing Malicious SSH Login AttemptsMalicious SSH login attempts have been appearing in some administrators' logs for several years. This article takes a new look at the use of honeypots to analyze malicious SSH login attempts and see what can be learned about this activity. The article then offers recommendations on how to secure one's system against these attacks. 2006-09-11 http://www.securityfocus.com/infocus/1876
After an Exploit: mitigation and remediationThis article describes a few hardening and alerting methods for Unix servers that help block vectors for various attacks, including two web-based application attacks, DNS issues, and the brute-forcing of SSH passwords. The article then looks at steps to take and lessons learned post-compromise. 2006-07-24 http://www.securityfocus.com/infocus/1871
Zero to IPSec in 4 minutesThis short article looks at how to get a fully functional IPSec VPN up and running between two fresh OpenBSD installations in about four minutes flat. 2006-02-28 http://www.securityfocus.com/infocus/1859
Chrooted Snort on SolarisThis article discusses the installation and configuration of a chrooted Snort IDS on most versions of Solaris. 2005-05-18 http://www.securityfocus.com/infocus/1837
Apache 2 with SSL/TLS: Step-by-Step, Part 3This article concludes our three part series dedicated to configuring Apache 2.0 with SSL/TLS support, for maximum security and optimal performance of SSL based e-commerce transactions. 2005-03-01 http://www.securityfocus.com/infocus/1823
Apache 2 with SSL/TLS: Step-by-Step, Part 2Part two of the Apache2 with SSL/TLS series offers mod_ssl recommendations and then discusses three different ways to sign a certificate, including setting up a local Certificate Authority using OpenSSL. 2005-02-02 http://www.securityfocus.com/infocus/1820
Apache 2 with SSL/TLS: Step-by-Step, Part 1This article begins a series of three articles dedicated to configuring Apache 2.0 with SSL/TLS support, in order to ensure maximum security and optimal performance of secure web communication. This part introduces key aspects of SSL/TLS and then shows how to compile and configure Apache 2.0 with support for these protocols. 2005-01-18 http://www.securityfocus.com/infocus/1818
SSH Port ForwardingIn this article we look at SSH Port Forwarding in detail, as it is a very useful but often misunderstood technology. SSH Port Forwarding can be used for secure communications in a myriad of different ways. 2005-01-06 http://www.securityfocus.com/infocus/1816
SSH and ssh-agentThis article discusses how to take SSH Identity/Pubkey trust relationships to the next level, by using ssh-agent as a keymaster to manage a user's authentication needs automatically. 2004-11-23 http://www.securityfocus.com/infocus/1812 |
|
Privacy Statement |