Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Infocus: Foundations (Page 5 of 10)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >
Virus Hoaxes and the Real Dangers They Pose
Virus Hoaxes are a fairly common phenomenon. Most email users have received messages warning of malicious viruses threatening to wreak havoc on their computers. Many of these hoaxes are harmless fun. Unfortunately, many pose real dangers. This article will offer a brief overview of virus hoaxes, how users can spot them, and how they can protect themselves against them.
By: Scott Granneman 2003-03-25
http://www.securityfocus.com/infocus/1678

IP Spoofing: An Introduction
IP spoofing allows an attacker to gain unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In this article, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it.
By: Matthew Tanase 2003-03-11
http://www.securityfocus.com/infocus/1674

U.S. Information Security Law, Part 1
This is the first article in a four-part series exploring the law of information security in the United States. This article addresses the legal framework for protection of information systems and the role of information security professionals in the creation of trade secret interests, one type of intellectual property.
By: Steven Robinson 2003-02-25
http://www.securityfocus.com/infocus/1669

Instant Insecurity: Security Issues of Instant Messaging
Instant messaging services are becoming an increasingly popular form of communication, both in the personal and the professional spheres. This paper will describe instant messaging and offer a brief overview of some of the security threats associated with the service.
By: Neal Hindocha 2003-01-13
http://www.securityfocus.com/infocus/1657

Securing Outlook, Part Two: Many Choices to Make
This is the second of two articles focusing on ways to secure one of the world's most popular e-mail clients, Microsoft's Outlook. The first article offered a brief overview of Outlook, as well as some security issues. It also discussed configuring Outlook for optimal security. This article will look at some more things that Outlook users can do to secure their e-mail.
By: Scott Granneman 2002-12-23
http://www.securityfocus.com/infocus/1652

Securing Outlook, Part One: Initial Configuration
Millions of Outlook users around the world, in homes, organizations, and businesses, have had to face the insecurities inherent in their email program, sometimes painfully. This article is the first of a two-part article that will examine ways that Outlook users can secure their email client.
By: Scott Granneman 2002-12-10
http://www.securityfocus.com/infocus/1648

Barbarians at the Gate: An Introduction to Distributed Denial of Service Attacks
DDoS attacks first made headlines in February 2000. Now, almost three years later, can it be that we're still vulnerable? Unfortunately the answer is yes. This article will explain the concept of DDoS attacks, how they work, how to react if you become a target, and how the security community can work together to prevent them.
By: Matthew Tanase 2002-12-03
http://www.securityfocus.com/infocus/1647

Security Concerns in Licensing Agreements, Part Two: Negotiating Security Provisions
This is the second of two articles that will discuss some security-related aspects of software licenses and agreements for Web-based information services. Part One focused on shrinkwrap and clickwrap agreements. This article will emphasize individually negotiated agreements, with particular regard to the opportunities for information security professionals to work with legal counsel in the negotiation and preparation of such agreements.
By: Steven Robinson 2002-10-21
http://www.securityfocus.com/infocus/1636

Assessing Internet Security Risk, Part 5: Custom Web Applications Continued
This article is the fifth and final in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. The previous installment discussed a relatively unexplored aspect of Internet security, custom Web applications. This article will conclude the discussion of Web applications.
By: Charl van der Walt 2002-10-08
http://www.securityfocus.com/infocus/1632

Assessing Internet Security Risk, Part 4: Custom Web Applications
This article is the fourth in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. This installment will discuss a relatively unexplored aspect of Internet security, custom Web applications.
By: Charl van der Walt 2002-10-03
http://www.securityfocus.com/infocus/1631

Foundations (Page 5 of 10)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >





VeriSign SSL Certificates secure e-commerce transactions



 

Privacy Statement
Copyright 2006, SecurityFocus