Network Security - Page 82

Discover Network Security News

Internet giants confer on denial-of-service attacks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A coalition of Internet companies formed in the wake of February's devastating denial-of-service attacks will offer a glimpse today of the work they've done to stop a repeat of the assault that brought down key sites across the Web, including those run by giants Amazon.com and Yahoo.. . .

New software 'shreds' e-mail

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Law-enforcement authorities are troubled by a new kind of software being released Wednesday that sounds like something out of Mission: Impossible. It can make e-mail messages self-destruct in 10 seconds.. . .

Network ICE Intros Open Source Carnivore Alternative

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network ICE has released the source code to Altivore, its new e-mail sniffing program. Greg Gilliom, the firm's CEO, told Newsbytes that the software is a potential alternative for Internet service providers (ISPs) which do not want to install Carnivore, the . . .

Why E-Security Is Hard to Tame

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The computer security industry, governments, patent and regulatory bodies, and consumers have moral and social obligations to work together to tackle the issues that are preventing a streamlined environment for electronic commerce. That's the opinion Fran Rooney, chief executive of Irish . . .

Virtual Private Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a general introduction to VPNs, including information on why they're used, architecture decisions, and more. A Virtual Private Network is a secured network connection between an individual and a private network (client-to-server) or a remote LAN and a private . . .

Reflections on the Future of Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Every season yields a bumper crop of computer security stories: break-ins, new vulnerabilities, new products. But this season has also given us a crop of stories about computer security philosophy. There has been a resurgence in opposition to the full disclosure . . .

When security fails: Forensics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've got a sound security setup, with firewalls, intrusion detection, authentication and authorization -- the gamut. Still, one day you find that valuable data is missing from a corporate server. You have no idea whether it's in the hands of an external hacker or a malicious insider. Now what do you do? . . .

Fed Execs Rank Top Security Computer Concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The SANS Institute revealed Tuesday that the top computer security concerns of 56 federal executives and administrators are: systems being used to attack other agencies' systems; computers being taken off-line for weeks because of hacker-caused corruption; and hackers changing data on . . .

Network ICE Releases Open-source Carnivore

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network ICE is disclosing the source code to a new e-mail sniffing program called "Altivore." This software provides a potential alternative to ISPs who do not want to install the FBI's secretive black-box known as "Carnivore." Altivore will allow ISPs to respond to court ordered e-mail surveillance without FBI help, thus allowing them to be self-regulated instead of government regulated.. . .

Authentication: Patterns of Trust

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are plenty of options for user authentication, but none is a "one-size-fits-all" solution. With so many available technologies, how do you select the right one for your organization's needs? "Systems architects sometimes get stuck on security planning, because it's hard . . .

Inexpensive measures to solve security problems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer security is difficult to achieve. It requires constant vigilance, and it involves inconvenience. Sometimes, expensive products are offered that are claimed to solve your security problems with no problems, and they do not deliver. However, there are a number of . . .

Investors call for action to curb hacking

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It could almost be a film script. The Federal Bureau of Investigation (FBI) is attacked by hackers who wreck havoc by flooding its website with false requests and bring it to a standstill. Yet this is what happened earlier this year. . . .

The Making of E-Commerce: 10 Key Moments, Part II

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is part two that discusses many of the most significant events in e-commerce history. Read Part One first. "From the first electronic business transactions to heartstopping e-tail sales figures, e-commerce burst onto the scene in dramatic . . .

Logging with Apache--Understanding Your access_log

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Apache comes with built-in mechanisms for logging activity on your server. In this series of articles, I'll talk about the standard way that Apache writes log files, and some of the tricks for getting more useful information and statistics out of . . .

VPNs take center stage

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Virtual private networks merge IP technology with encryption to offer significant cost savings on WAN traffic.Sure you want a VPN. It can save you money. It can give you a better-meshed network. It can let more people share your enterprise resources . . .

Is a Firewall Enough?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Erick Lee writes: "Is a firewall enough to provide security to your network? The answer is no. A common misconception is that firewalls recognize attacks and block them. In fact, firewalls perform only limited, specific functions in network security." . . .