Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Infocus: Firewalls (Page 1 of 2)   1 2  Next >
Demystifying Denial-Of-Service attacks, part one
This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks.
By: Abhishek Singh, CISSP 2005-12-14
http://www.securityfocus.com/infocus/1853

Software Firewalls: Made of Straw? Part 2 of 2
Part two looks at Layered Service Provider based Trojans hidden in the protocol stack, providing stealthy communication through an open firewall port.
By: Israel G. Lugo, Don Parker 2005-06-20
http://www.securityfocus.com/infocus/1840

Software Firewalls: Made of Straw? Part 1 of 2
This article looks at design issues with software firewalls that can render them useless in several ways.
By: Israel G. Lugo, Don Parker 2005-06-08
http://www.securityfocus.com/infocus/1839

Software Firewalls versus Wormhole Tunnels
This article explains how the PCAP library on Windows can be used to render software firewalls and client VPN environments ineffective, easily bypassing traditional security measures.
By: Bob Rudis and Phil Kostenbader 2005-05-04
http://www.securityfocus.com/infocus/1831

The Perils of Deep Packet Inspection
This paper looks at the evolution of firewall technology towards Deep Packet Inspection, and then discusses some of the security issues with this evolving technology.
By: Dr. Thomas Porter 2005-01-11
http://www.securityfocus.com/infocus/1817

Packet Crafting for Firewall & IDS Audits (Part 2 of 2)
This article is the second of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques.
By: Don Parker 2004-07-19
http://www.securityfocus.com/infocus/1791

Packet Crafting for Firewall & IDS Audits (Part 1 of 2)
This article is the first of a two-part series that will discuss various methods to test the integrity of your firewall and IDS using low-level TCP/IP packet crafting tools and techniques.
By: Don Parker 2004-06-28
http://www.securityfocus.com/infocus/1787

Transparent, Bridging Firewall Devices
This article examines the concept of a transparent or bridging firewall which sits hidden in-line with the network it protects.
By: Matthew Tanase 2003-10-15
http://www.securityfocus.com/infocus/1737

Hardening the TCP/IP stack to SYN attacks
This article discusses methods of hardening the TCP/IP stack of various operating systems to make servers more resistant to SYN flooding and SYN spoofing Denial of Service (DOS) attacks.
By: Mariusz Burdach 2003-09-10
http://www.securityfocus.com/infocus/1729

Slow Down Internet Worms With Tarpits
This timely article discusses how to slow the spread of Internet worms using a tarpit and IPtables on Linux. A similar approach could potenially be used with tarpits on Windows platforms, Solaris, OpenBSD, and others.
By: Tony Bautts 2003-08-21
http://www.securityfocus.com/infocus/1723

Firewalls (Page 1 of 2)   1 2  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus