Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Infocus (Page 1 of 58)   1 2 3 4 5 6 7 8 9 10 11  Next >
Social engineering reloaded
The purpose of this article is to go beyond the basics and explore how social engineering, employed as technology, has evolved over the past few years. A case study of a typical Fortune 1000 company will be discussed, putting emphasis on the importance of education about social engineering for every corporate security program.
By: Sarah Granger 2006-03-14
http://www.securityfocus.com/infocus/1860

Zero to IPSec in 4 minutes
This short article looks at how to get a fully functional IPSec VPN up and running between two fresh OpenBSD installations in about four minutes flat.
By: Dragos Ruiu 2006-02-28
http://www.securityfocus.com/infocus/1859

Sebek 3: tracking the attackers, part two
The second article in this honeypot series discusses best practices for deploying Sebek 3 inside a GenIII honepot, and shows how to patch Sebek to watch all the attacker's activities in real-time.
By: Raul Siles, GSE 2006-02-13
http://www.securityfocus.com/infocus/1858

Malicious Malware: attacking the attackers, part 2
This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two.
By: Thorsten Holz, Frederic Raynal 2006-02-02
http://www.securityfocus.com/infocus/1857

Malicious Malware: attacking the attackers, part 1
This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two.
By: Thorsten Holz, Frederic Raynal 2006-01-31
http://www.securityfocus.com/infocus/1856

Sebek 3: tracking the attackers, part one
The first of this two-part series will discuss what Sebek is and what makes it so interesting, first by looking at the new capabilities of version 3 and how it integrates with GenIII Honeynet infrastructures.
By: Raul Siles, GSE 2006-01-16
http://www.securityfocus.com/infocus/1855

Windows rootkits of 2005, part three
The third and final article in this series explores five different rootkit detection techniques used to discover Windows rootkit deployments. Additionally, nine different tools designed for administrators are discussed.
By: James Butler, Sherri Sparks 2006-01-05
http://www.securityfocus.com/infocus/1854

Demystifying Denial-Of-Service attacks, part one
This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks.
By: Abhishek Singh, CISSP 2005-12-14
http://www.securityfocus.com/infocus/1853

Evading NIDS, revisited
This article looks at some of the most popular IDS evasion attack techniques, based on fragmentation or using the TTL field. Snort's configuration and response to these attacks will also be discussed.
By: Sumit Siddharth 2005-12-06
http://www.securityfocus.com/infocus/1852

Windows rootkits of 2005, part two
This three-part article series looks at Windows rootkits indepth. Part two focuses on the latest cutting edge rootkit technologies that are used to hide malicious code from security scanners.
By: James Butler, Sherri Sparks 2005-11-17
http://www.securityfocus.com/infocus/1851

Infocus (Page 1 of 58)   1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus