Packet Storm

Displaying 1-2 of 2 results

  • White Papers // Aug 2011

    Sophail: A Critical Analysis of Sophos Antivirus

    Antivirus vendors often assert they must be protected from scrutiny and criticism, claiming that public understanding of their work would assist bad actors. However, it is the opinion of the author that Kerckhoffs's principle1 applies to all security systems, not just cryptosystems. Therefore, if close inspection of a security product...

    Provided By Packet Storm

  • White Papers // Jul 2010

    Cisco VoIP Phones - A Hackers Perspective

    In the world of VoIP phones, each person may look at them differently. For some, it is just an annoyance that sits on their desk. For others, it is simply a part of their job, either deploying them or as a help desk position taking phone calls all day. For...

    Provided By Packet Storm

  • White Papers // Jul 2010

    Cisco VoIP Phones - A Hackers Perspective

    In the world of VoIP phones, each person may look at them differently. For some, it is just an annoyance that sits on their desk. For others, it is simply a part of their job, either deploying them or as a help desk position taking phone calls all day. For...

    Provided By Packet Storm

  • White Papers // Aug 2011

    Sophail: A Critical Analysis of Sophos Antivirus

    Antivirus vendors often assert they must be protected from scrutiny and criticism, claiming that public understanding of their work would assist bad actors. However, it is the opinion of the author that Kerckhoffs's principle1 applies to all security systems, not just cryptosystems. Therefore, if close inspection of a security product...

    Provided By Packet Storm