Skip navigation.
Home
Security Folks: The mission of this site is to assist security folks in their endeavors. If you know the answer to any of the users questions, please take time to respond with the answer. You can also submit security related tips, tricks and articles on this site.

Symantec taps VeriSign, Accenture to bolster security

Symantec Corp. is teaming with VeriSign Inc. and Accenture Ltd. as part of its Security 2.0 strategy for protecting consumers and enterprise users from the latest and greatest security threats, which Symantec says are increasing in complexity and scope.
At a New York event on Tuesday, Symantec announced a partnership with VeriSign to support VeriSign's Identity Protection (VIP) Authentication Service, which protects users online by issuing them a password that can be used across multiple Web sites.

Windows Firewall flaw may hide open ports

A flaw in Windows Firewall may prevent users from seeing all the open network ports on a Windows XP or Windows Server 2003 computer.
The flaw manifests itself in the way the security application handles some entries in the Windows Registry, Microsoft said in a security advisory published Wednesday. The Windows Registry stores PC settings and is a core part of the operating system.

Netscreen Firewall Decision Making Process

This flow chart shows you how a Netscreen Firewall Makes its decision as to how to process a packet. This is by far the most important basic that a Firewall Administrator has to understand to manage the Netscreen Firewall. So you can pay special attention and thoroughly understand or memorize the concept. This will assist you in policy creation and troubleshooting.

The Difference Between a Virus, Worm and Trojan Horse

The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.

Firefox JavaScript security "a complete mess"?

Firefox is loaded with security flaws, according to a hacker duo that presented at this year's ToorCon. Mischa Spiegelmock and Andrew Wbeelsoi used a session at the show to highlight what they have called "a complete mess" that is "impossible to patch" in Firefox's JavaScript implementation. According to the pair, the implementation is home to at least 30 possible exploits, all of which they plan to keep to themselves. CNet's Joris Evers brought the story to light this past weekend, but reports are surfacing everywhere.

How to use your PC and Webcam as a motion-detecting and recording security camera

This tutorial will take you step-by-step through setting up your PC and Webcam to act as a motion-detecting and recording security camera system. And the software required to do this is open source (free).

Hackers claim zero-day flaw in Firefox

An attacker could commandeer a computer running the browser simply by crafting a Web page that contains some malicious JavaScript code, Mischa Spiegelmock and Andrew Wbeelsoi said in a presentation at the ToorCon hacker conference here. The flaw affects Firefox on Windows, Apple Computer's Mac OS X and Linux, they said.

"Internet Explorer, everybody knows, is not very secure. But Firefox is also fairly insecure," said Spiegelmock, who in everyday life works at blog company SixApart. He detailed the flaw, showing a slide that displayed key parts of the attack code needed to exploit it.

Learning an advanced skillset

The purpose of this article is to guide network security analysts towards learning the advanced skillset required to help further their careers. We'll look at two key pillars of knowledge, protocols and programming, and why they're so both so important in the security field.

Mozilla flaws more joke than jeopardy

Two presenters razzed developers of the open-source Mozilla browser this weekend at the ToorCon hacking convention in San Diego with claims that the browser's Javascript implementation is flawed, but the lecture appears to have been more stand-up comedy routine than substantiative research

How to Find the Speed of an Interface on a Solaris machine

Use this to find out the speed of the interface of the solaris box.

ndd -set /dev/qfe instance 0
ndd -get /dev/qfe link_speed

How to Configure Cisco PIX Firewall Part I

How to Configure PIX Firewall.

Abstract:

Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network with a PIX Firewall connected to the Internet through the Outside Interface, Internal Network through the Inside interface and DMZ through the DMZ Network. This paper would assist you in a simple step by step, near complete configuration for a PIX Firewall running a midsized corporate network

How to Configure Cisco PIX Firewall Part II


Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network with a PIX Firewall connected to the Internet through the Outside Interface, Internal Network through the Inside interface and DMZ through the DMZ Network. This paper would assist you in a simple step by step, near complete configuration for a PIX Firewall running a midsized corporate network

This is part II of the How to Configure Pix Firewall, a step by step approach.
This is in continuation of the Part I of the series.

10 Best Practises to Protect your PC

Ten Commandments to Protect your PC:

Please find below the ten best practices you can follow to protect your PC:

TOP Intrusion Detection Systems Interview Questions and FAQs -Part I


TOP Intrusion Detection Systems Interview Questions and FAQs:

Here is a list of the top intrusion detection systems frequently asked questions. This section is also a very good resource for preparation of job interviews for IDS.

TOP Intrusion Detection Systems Interview Questions and FAQs -Part II


What are events?

Events are actions that take place on the network. Examples of events might be a failed connection attempt, a connection established between two computers, a successful authentication and login, a Web browser requesting a URL, or the response sent back by the a Web server.

Search



 

Web

www.secmanager.com






Syndicate content