Secure Coding
The primary cause of commonly exploited software vulnerabilities is software defects that could have been avoided. Through our analysis of thousands of vulnerability reports, the CERT/CC has observed that most of them stemmed from a relatively small number of root causes.Friday, 24 March 2006 10:23 EST
Configuring a free VPN solution in your home
VPNs or Virtual Private Networks continue to increase in popularity due to the rise of inexpensive, high capacity Internet connectivity. Therefore lots of people are now using secure VPNs in order to connect to their home based networks as well as their office networks. If you have stumbled across this article and do not know the meaning of the term VPN it would be as follows:Friday, 24 March 2006 10:21 EST
What Is Steganography?
Steganography is a subject which is rarely touched upon by most IT Security Enthusiasts. Most people don't see Steganography has a potential threat, some people don't even know what Steganography is. With this FAQ I hope to answer any questions anyone may want to ask about Steganography, and to educate people so they can understand what exactly Steganography is. Is Steganography a potential threat? Well your about to find out.Friday, 24 March 2006 10:20 EST
IT Professionals Express Concerns Over VoIP
48 per cent of networking professionals remain concerned about the general reliability and robustness of Voice over IP (VoIP) for serious business use according to a recent UK survey. 52 per cent of respondents also admitted to concerns about the ability of their network to withstand VoIP traffic. This was despite over 62 per cent of those questioned having implemented the technology, or planning to do so in the next 12 months.Friday, 24 March 2006 07:19 EST
Engineering Firm White Lists Vulnerable Apps
When Patton Harris Rust & Associates found out that Microsoft's Windows MetaFile (WMF) had a security vulnerability that might be exploited for zero-day attacks, PHR&A's IT team quickly removed the offending WMF dynamic link library file from its application whitelist.Friday, 24 March 2006 07:17 EST
Compliance and mobility govern security
The one segment in IT that has seen tremendous growth over the past few years is security. Despite advances in technology, security threats are growing at an alarming rate. The Indian network security market experienced a healthy growth in 2005 reaching about $116 million, up 70 percent compared to last year, says business consulting firm Frost & Sullivan.Friday, 24 March 2006 07:16 EST
Guide to Installing a Cisco PIX 501 Firewall
A firewall acts as a security guard, standing watch over data as it travels in and out of your network. Yet unlike a security guard, it doesn't rely on magic passwords or secret keystrokes to determine whether to accept or deny data.Friday, 24 March 2006 07:01 EST
SMS encryption
Two Czech programmers, Dr. Marian Kechlibar and Jiří Šatánek, have developed SMS007, which is a program that advertises that no third party would be able to read text messages sent with this method.Friday, 24 March 2006 06:50 EST
Ten Remote-Access Failures to Avoid in an Emergency
Remote-access solutions are a critical part of a successful disaster recovery plan, according to industry experts. However, enterprises must make sure a remote-access system is properly deployed and prepared if disaster strikes. In a recent report, Gartner VP distinguished analyst John Girard outlines the most common mistakes enterprises make and provides steps to avoid such failures.Friday, 24 March 2006 06:24 EST
Standards-Based Network Security Tools
These days, when your core main switch starts throwing errors, you can match IPs and MAC addresses from the console of one network tool to another, trace cables in closets, and read switch logs to track down the problem device and its user. Or you can enter the problem IP in your Locate network appliance and go directly to the problem machine and its user to resolve the issue—typically a bad network card or an incorrect network protocol.Friday, 24 March 2006 05:29 EST
Next