+

Category: Articles

June 2, 2011

Articles Redaction Comments Off

Obscuring the Truth

Veiled in a world of pseudo-randomized padded nulls lies the answer in plain sight, laughing at you mockingly. It’s really only a matter of connecting the dots… Or is it? Can the answer be shielded better by simply adding more dots to connect? Does this help or hinder, and whom? Encryption is a double-edged sword […]

Read more

June 2, 2011

Articles Redaction Comments Off

Attacking, Authentication, and Access Control

As part of a growing trend where people utilize more services on-line, we rely more and more on entering our data into what we trust as being secure web-forms. Has it ever crossed our minds while we enter our information into web forms that our trust would ever be compromised? We assume that no one […]

Read more

June 2, 2011

Articles Redaction Comments Off

Access Control: Lock-down Your Network

If most of the threats are coming from the inside, what are you doing about it? According to US-CERT (United States Computer Emergency Readiness Team), 95% of downtime and IT related compliance issues are a direct result of an exploit against a Common Vulnerability and Exposure. A firewall, IDS, IPS, anti-virus software and other countermeasures […]

Read more

June 2, 2011

Articles Redaction Comments Off

Flexible Access Online: ASP.NET’s Access Control for the Web

The web was not built to remember users between trips to the server. In fact, the stateless nature of the HTTP forgets anything outside of the immediate Request traveling to the Server or Response going to the Browser. All memory must be handled by features in the Application Server or by the Browser. All memory […]

Read more

June 2, 2011

Articles Redaction Comments Off

VoIP Access Control

Access control is a means by which we determine whether an agent is allowed to gain entry to a particular resource. In the case of physical security or even traditional network security, this may seem straightforward. For example, if you trust someone to gain access to a room where critical resources are kept, you provide […]

Read more

June 2, 2011

Articles Redaction Comments Off

Wireless ad hoc Network and its Vulnerabilities

A mobile ad-hoc network (MANET) is a self configuring infrastructure-less network, consisting of mobile devices, connected via wireless links. Each device in MANET can move independently from others in any direction, and therefore change its links very frequently. Each device on MANET must forward data unrelated to its own use and therefore serve not just […]

Read more

June 2, 2011

Articles Redaction Comments Off

Why are there So Many Command and Control Channesl

Command and control channels are an often unappreciated bit of art. Yes art. Most folks don’t pay that much attention to them, professionally or personally. But as a person that spends most of my day finding and picking them apart I can tell you there are some very interesting things going on behind your favorite […]

Read more

June 2, 2011

Articles Redaction Comments Off

Msona mBox 2000 Features & Functionality Report

In some ways it can be seen as the Holy Grail of IT procurement – finding the all-in-one office solution that does it all, without complicated installation and management; just fire up and off you go. Of course, in reality – as an absolute – this is largely a pipe dream. But for the Small […]

Read more

April 29, 2011

Articles Redaction Comments Off

Experts on Cloud

Antivirus in the Cloud: fad or future? by Malcolm Tuck, UK Managing Director, Kaspersky Lab Cloud Computing Standards: The Great Debate Justin Pirie, Director of Communities and Content for Mimecast Cloud Security: Whose responsibility is it anyway? by Rik Ferguson, Director of Security Research & Communications, Trend Micro EMEA [hidepost=1] [/hidepost]Comments

Read more

April 29, 2011

Articles Redaction Comments Off

An analysis of the cloud security threat

The cloud is very much the talk of the IT media town these days. Client side computational resources are still in demand but IT vendors and businesses are looking to the cloud in the hope that third-party companies will manage the network infrastructure (including overload requirements whereby the company has to pay for additional hosting […]

Read more

April 29, 2011

Articles Redaction Comments Off

Cloud Security: Is the Sky Falling Already? Is It Raining Cats and Dogs or Have We Found a Silver Lining in Cloud Computing?

Everyone seems to be jumping into the Cloud with both feet and many before they have realized that there may not be a silver lining with their public or private cloud. Just take a look at the competitive nature of streaming video on demand, offered by NetFlix through the Cloud or Amazon or large cable […]

Read more

April 29, 2011

Articles Redaction Comments Off

Cloud Computing Legal Framework and Privacy

The internet does not belong to one country or region. Therefore, international collaboration is a key area of focus and we need to continue to work with partners around the globe in support of our cybersecurity goals. Howard A. Schmidt [hidepost=1] [/hidepost]Comments

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa