General discussion

Locked

Adventures in Security

By tolzak ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

249 total posts (Page 1 of 25)   01 | 02 | 03 | 04 | 05   Next
| Thread display: Collapse - | Expand +

All Comments

Collapse -

Securing VoIP

by tolzak In reply to Adventures in Security

?
Voice over IP, also known as VoIP, is quickly growing in popularity. Organizations are initially attracted to this relatively new technology because of its lower per call costs when compared to traditional voice services.? But they soon realize that VoIP provides additional value.

Unified messaging, though still in its infancy, is introduced into the enterprise.? Users [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=12">This post originally appeared on an external website</a></div>

Collapse -

Deleted Data Files Aren?t?

by tolzak In reply to Adventures in Security

Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=16">This post originally appeared on an external website</a></div>

Collapse -

The Fundamentals of Keystroke Logging

by tolzak In reply to Adventures in Security

This month, hackers in China attempted to place keystroke loggers onto UK Parliament systems via email messages. ?Phishing attacks in which keystroke loggers are installed on PCs are becoming more frequent. ?Keystroke loggers are also popular among hackers whose attack vector of choice is instant messaging. ?Because of the growth in the rate of keystroke [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=18">This post originally appeared on an external website</a></div>

Collapse -

Peer-to-Peer IP Telephony Security Challenges

by tolzak In reply to Adventures in Security

Peer-to-peer?VoIP phone services provide an inexpensive alternative to traditional switched services.? So?many businesses are looking?at ways to implement this Internet-based functionality.? Before you?make a decision to toss out the old and bring in the new, it’s important to understand the risks associated with Internet phone service.?
Since Skype is the unquestioned leader in this?space, I’ll use?it [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=19">This post originally appeared on an external website</a></div>

Collapse -

An Intrusion Defense Solution

by tolzak In reply to Adventures in Security

Rather than write another piece on security in general for today’s post, I’m going to share my team’s experience in selecting an intrusion defense solution that expands on our existing firewall perimeter defense.? During the past several weeks, my team and I?struggled with the new infrastructure and management design to support our enterprise security strategy.? [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=26">This post originally appeared on an external website</a></div>

Collapse -

BIOS Rootkit Attacks: What?s the Real Risk?

by tolzak In reply to Adventures in Security

As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=28">This post originally appeared on an external website</a></div>

Collapse -

Managing Unapproved Applications

by tolzak In reply to Adventures in Security

In today’s workplace, users aren’t satisfied with the applications provided by the internal IS staff.? In an effort to maximize their productivity and to improve their work environment (at?least those are the reasons given), many users install applications brought in from home, downloaded from the Internet, or provided by a friend.? So if it makes [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=29">This post originally appeared on an external website</a></div>

Collapse -

Desktop Security Service - Windows OneCare

by tolzak In reply to Adventures in Security

In the spring of 2005, OneCare was released with much fanfare.? It’s Microsoft’s venture into the world of desktop security.? But it comes with a twist.? Microsoft’s solution is a software-as-a-service offering.? This means that you will probably pay a monthly fee for the rights to run the combined anti-virus, backup, cleanup, and update services.? [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=31">This post originally appeared on an external website</a></div>

Collapse -

Dissecting Nyxem: New dog, same old tricks.

by tolzak In reply to Adventures in Security

There has been some real buzz concerning a new virus in the wild, Nyxem. While it employs the same old tricks virus coders have been using for years, it has a new nasty ending. Let’s discuss Nyxem (aka Mywife, Blueworm, BlackMal) and see what kind of risk we are really looking at.

How does this work?
The [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=34">This post originally appeared on an external website</a></div>

Collapse -

Data Storage Security

by tolzak In reply to Adventures in Security

Data in transit, across and between company networks, is usually the focus of extensive security efforts.? However, organizations typically regard data residing on internal storage devices as “secure enough.”? Databases and flat files stored on server, laptop, or SAN-attached disks don’t always move outside the security perimeter; so why worry?
In this paper, we’ll explore data [...]<p><div class="blogdisclaim"><a href="http://adventuresinsecurity.com/blog/?p=38">This post originally appeared on an external website</a></div>

Back to After Hours Forum
249 total posts (Page 1 of 25)   01 | 02 | 03 | 04 | 05   Next

Related Discussions

Related Forums