Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Infocus: Foundations (Page 1 of 10)   1 2 3 4 5 6  Next >
Learning an advanced skillset
The purpose of this article is to guide network security analysts towards learning the advanced skillset required to help further their careers. We'll look at two key pillars of knowledge, protocols and programming, and why they're both so important in the security field.
By: Don Parker 2006-03-24
http://www.securityfocus.com/infocus/1861

Social engineering reloaded
The purpose of this article is to go beyond the basics and explore how social engineering, employed as technology, has evolved over the past few years. A case study of a typical Fortune 1000 company will be discussed, putting emphasis on the importance of education about social engineering for every corporate security program.
By: Sarah Granger 2006-03-14
http://www.securityfocus.com/infocus/1860

Reducing browser privileges
This article shows the simple approach of reducing privileges for Internet-facing applications such as IE, Firefox, IM and email clients when the user must operate as an administrator.
By: Mark Squire 2005-10-04
http://www.securityfocus.com/infocus/1848

Identifying P2P users using traffic analysis
This article looks at identifying P2P users and applications in large networks by analyzing traffic behavior instead of monitoring ports or application data.
By: Yiming Gong 2005-07-21
http://www.securityfocus.com/infocus/1843

Bluetooth Security Review, Part 2
Part 2 of the Bluetooth series looks at several unpublished vulnerabilities in Symbian based phones, and then moves on to discuss "Blue Tag" tracking, positioning, and privacy issues.
By: Marek Bialoglowy 2005-05-26
http://www.securityfocus.com/infocus/1836

Bluetooth Security Review, Part 1
This two-part series looks at Bluetooth security and privacy issues, including methods of detection, data loss prevention and social engineering.
By: Marek Bialoglowy 2005-04-25
http://www.securityfocus.com/infocus/1830

Introduction to Spyware Keyloggers
The purpose of this article is to discuss keyloggers found in spyware applications, including their detection, features, and removal.
By: Sachin Shetty 2005-04-14
http://www.securityfocus.com/infocus/1829

How ITIL Can Improve Information Security
This article provides an overview of ITIL, a management-level set of best practices and guidelines for an integrated and process-based approach to IT and security.
By: Steven Weil 2004-12-22
http://www.securityfocus.com/infocus/1815

Trends in Web Application Security
This article discusses current trends in penetration testing for web application security, and in particular discusses a framework for selecting the best tool or tools to use for this increasingly common type of application.
By: Kapil Raina 2004-10-27
http://www.securityfocus.com/infocus/1809

Examining a Public Exploit, Part 2
The purpose of this article is to analyze a public exploit in a lab environment, see the alerts generated by an intrusion detection system, and then do some packet analysis of the malicious binary in order to better understand what it does and how you may have been compromised. Part 2 of 2.
By: Don Parker 2004-09-15
http://www.securityfocus.com/infocus/1801

Foundations (Page 1 of 10)   1 2 3 4 5 6  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus