Techworld - the UK's infrastructure and network knowledge centre
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business

Home | News | Insight | How-tos | White papers | Case studies | Interviews | Briefings | Reviews | Blog

News

More news »


Insight

More »


How-To

More »


White Papers

More »


Briefings

More »


  Windows Security Articles  

 

Updated: Wednesday 14 June 22:50 UK

Group Policy Changes in Vista

In this article we will look at the new Group Policy features in Vista.

SPIKE and BURP for real world computer security usage (Part 2)

In this part two of the article series we will actually use an HTTP proxy and find out more on how you can use this very useful tool.

Calamitous Cryptography: The Extortoise and the Haregretful

Cryptovirology - cryptography's evil younger sibling. Let's look at how the intensity of this dark science feeds directly from the security of its older, defensive brother.

Event Log/Monitoring Consolidation

In most corporate organizations today there is a large array of computer network security devices deployed. All of these security tools produce voluminous amounts of output. What good is that output unless you can make use of it?

How to Nest Users and Groups for Permissions

In this article I will show you how to nest users and groups for permissions.

More »

Blog: Write Once, Read Many

More blog entries »


Reviews

More reviews »


Interviews

  • A patch off the old block
    We talk to Mark Shavlik, eponymous boss of Shavlik Technologies, about writing code for Microsoft, the evolution of patch management tools and their growth towards regulatory compliance.
  • A patch in time saves nine
    Risk management should mean less patching for security and software, not more, argues Skybox's Edward Cooper.
  • Tit for tat
    Everdream and Iron Mountain's DataDefense both have products and services to protect desktop PC and notebook data if the computer is lost or stolen. How do they compare?

More »


Case Studies

More »


  Security Alerts  

Updated: Wednesday 14 June 23:10 UK

Fast Menu Restaurant Ordering Multiple Vulnerabilities

luny has reported some vulnerabilities in Fast Menu Restaurant Ordering, which can be exploited by malicious people to conduct cross-site scripting attacks and SQL injection attacks.

blur6ex "ID" Parameter SQL Injection Vulnerability

rgod has reported a vulnerability in blue6ex, which can be exploited by malicious people to conduct SQL injection attacks.

Car Classifieds "make_id" Cross-Site Scripting Vulnerability

luny has reported a vulnerability in Car Classifieds, which can be exploited by malicious people to conduct cross-site scripting attacks.

PhpMyFactures Multiple Vulnerabilities

DarkFig has discovered some vulnerabilities in PhpMyFactures, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and to bypass certain security restrictions.

Realty Home Rent "sel_menu" Cross-Site Scripting Vulnerability

luny has reported a vulnerability in Realty Home Rent, which can be exploited by malicious people to conduct cross-site scripting attacks.

Realty Room Rent "sel_menu" Cross-Site Scripting Vulnerability

luny has reported a vulnerability in Realty Room Rent, which can be exploited by malicious people to conduct cross-site scripting attacks.

more »