Home arrow Security
 

SECURITY HELP, SECURITY TUTORIALS, SECURITY PROGRAMMING, SECURITY TRICKS

RSS For Dev Shed
Systems administrators have more than enough threats they need to worry about. There are viruses, worms, DDoS attacks, and phishers, just to name a few. Letís not even talk about employees who arenít up on security protocols! On the other hand, letís talk about them. If you have to deal with these and other problems regularly, we have the aspirin for your security headache.

  Date Title Author Hits
  03-30-05 

Firewalls

Addison-Wesley Pre... 224621

If you have ever wondered how to configure and run a secure open source firewall, look no further. This book excerpt is from chapter three of Open Source Security Tools by Tony Howlett, ISBN 0321194438, copyright 2004. All rights reserved. It is reprinted with permission from Addison-Wesley Professional.

  02-28-05 

Whatís behind the curtain? Part II

Eliana Stavrou 43216

In this second of a three-part series covering threats to computer security, we focus on attacks that are more specifically directed against a particular person or company.

  02-21-05 

Whatís behind the curtain? Part I

Eliana Stavrou 49343

It's no secret that any computer connected to the Internet faces a wide array of security threats. These days, however, a business needs to be connected to the Internet just to do business. What can you do? Keep reading to learn more about risks you take, and what you can do to protect yourself and your company.

  02-02-05 

Vectors

Apress Publishing 77329

Many of us who use use security products on our computers religiously are bewildered to find that we still get infected with malware. How does this happen? No matter what we do, our computers are constantly in touch with the vectors that carry malicious software. Thomas Greene explains what this means, and what we can do about it.

  01-24-05 

PKI: Looking at the Risks

Eliana Stavrou 54613

Public key infrastructure (PKI) is an excellent technology to help users certify that the people or companies they are corresponding with are who they say they are. It has proven itself invaluable in e-commerce among other areas. As with any technology, however, it is not without its own security risks. Eliana Stavrou discusses these risks, and ways to minimize them.

  01-04-05 

A Quick Look at Cross Site Scripting

Alejandro Gervasio 184252

We may not be able to completely bulletproof our websites, but we can at least try to anticipate possible attacks and secure against them. Here is one you might not have heard of: cross site scripting. With just a bit of JavaScript, a malicious attacker can use it to cause all sorts of problems. To find out more about what it is, and how to prevent your website from becoming a victim, keep reading.

  10-26-04 

PKI Architectures: How to Choose One

Eliana Stavrou 80542

In the Internetís world of insecurities, many actions should be taken to enhance the defense of each and every network. Many solutions exist that provide a level of security, none however being bulletproof. The best approach is to combine a variety of mechanisms that will supplement one another. In this article I will discuss a technology that is considered to be the new trend and a favored option among network implementers, that is Public Key Infrastructure (PKI).

  10-12-04 

Trust, Access Control, and Rights for Web Services, Part 2

Sams Publishing 81751

Web services themselves provide a powerful new approach to PKI that prevents each Web service requestor and provider from having to build their own PKI: accessing a trusted PKI as a service. XKMS aims to do just that. This is part 2 of chapter 9 from Securing Web Services with WS-Security, by Rosenberg and Remy (ISBN 0672326515, SAMS, 2004).

  10-04-04 

Basic Concepts of Web Services Security

Sams Publishing 117095

Today we cover the basics of Web services and information security and the way Web services security builds on existing security technology. This is chapter 1 from Securing Web Services with WS-Security, by Rosenberg and Remy (ISBN 0672326515, Sams, 2004).

  09-09-04 

Safeguarding the Identity and Integrity of XML Messages

Sams Publishing 120996

XML Signature and XML Encryption, two of the three major pillars of the WS-Security standard, are so predominant in current thinking about Web Services Security that some people mistake them as the only strategy for securing Web services. This is really not the case at all. Read more in this chapter from Securing Web Services with WS-Security, by Rosenberg and Remy (ISBN 0672326515, SAMS, 2004).

  08-23-04 

Hacking Your Own Site

Dan Wellman 322590

The purpose of this article is not to teach you how to hack sites, but to show you some scenarios that may reveal to you how vulnerable your existing site may be, or will hopefully help you prevent any future sites from having these vulnerabilities.

  07-26-04 

Trust, Access Control, and Rights for Web Services Part 1

Rosenberg, Remy 109688

Several other important standards are derived from and are complementary to WS-Security; they relate to such fundamental security topics as trust, access control, and rights. In this chapter, we review the family of WS-SecurityĖrelated technologies. This is part 1 of chapter 9 from Securing Web Services with WS-Security, by Rosenberg and Remy (ISBN 0672326515, Sams, 2004).

  06-01-04 

Lock Down Your Website

Dan Wellman 97150

With all the benefits of e-commerce there are dangers such as identity theft for consumers and cyber attacks on websites. Site owners need take preventative measures. Wellman presents some security procedures and scripts for PHP driven sites.

  05-18-04 

Regaining Control of a Hacked PHP-Nuke Site

Vinu Thomas 80047

PHP-Nuke is spreading over the Internet as a popular CMS system. If you have a PHP-Nuke installation which has been hacked into, read on to find out how to regain control of your site. If your site hasn't been hacked, read on to learn how to secure your installation.

  05-11-04 

Security Management Architecture

McGraw-Hill/Osborne 61053

This chapter provides a thorough guide to many security issues. The authors encourage writing strong enforcement statements of acceptable use policies (AUPs) and provide examples of wordings and a best practices checklist. They cover how to limit authority and separate duties and how to pinpoint accountability. The chapter is from Network Security: The Complete Reference, by Mark Rhodes-Ousley, Roberta Bragg and Keith Strassberg; ISBN:0-072-22697-8, McGraw-Hill/Osborne, 2003.

 
More Security Articles
Total Security Articles = 32

Page 2 of 3
1 2 3 

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: