best practices

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself….

Secure Coding

Secure Coding 9/11

In Brief By Armando Romeo, eLearnSecurity and ID Theft Protect The Bug Story By Ali Hadi Despite the fact that our Networks gardens are full of beautiful/gorgeous things, at same time they’re full of bugs. The problem is that the…

Enterprise IT Security Magazine 1/2011

Enterprise IT Security Magazine 1/2011

Defining Best Practices for IT Security Within a Cloudy World by Chris Poulin Cloud Computing – Is it Worth the Move? by Gary S. Miliefsky Coud Computing and Its Security Benefits by Ajay Porus Cloud Security Advancement and Its Effects…

Hakin9 Extra 3/2011 - Forensics

Hakin9 Extra 3/2011 – Forensics

Basic Forensics Analysis by Marc-Andre Meloche Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is…

Firestarter: Starter to your Firewall

The firewall is the first line of defense on the network perimeter and end points. Firewalls are the gatekeepers to facilitate the flow of necessary traffic to and from assets. The author in his article focuses on the best practices…

Web App Security

Web App Security 7/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Mummies still walk among us! By Ali Al-Shemery Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites…

ID Theft - Hakin9 03/2011

ID Theft – Hakin9 03/2011

The best way, to learn and apply cryptography ARKADIUS C. LITWINCZUK The CrypTool project is about making the sometimes daunting subject of cryptography more accessible and easy to understand. It is the most comprehensive cryptography learning tool worldwide. Analysis of…

Hacking Trust Relationships

This article is the first in a series of six, which covers the topic of hacking trust relationships. This first article focuses specifically on Information Gathering against a target system, in order to identify potential trust relationships. Author: THOMAS WILHELM…

AppliCure dotDefender and dotDefender Monitor

Applicure’s freeware tool dotDefender Monitor was highlighted in the latest SANS Top 20 Internet Security Risks as a tool to detect the latest emerging threat of vulnerabilities in web applications. Together with Applicure dotDefender it monitors and protects against internal…

Secure Switching with Cisco Platforms

This article provides a detailed account of the operation of three highly effective abuses possible in a default-state switched network and how to mitigate them with Cisco platforms. At the end of the article a Top 10 security checklist is…