Archive

Archive for April, 2004

SQL Injection Signatures Evasion

April 21st, 2004
Comments Off on SQL Injection Signatures Evasion

In recent years, Web application security has become a focal center for security experts. Application attacks are constantly on the rise, posing new risks for the organization. One of the most dangerous and most common attack techniques is SQL Injection, which usually allows the hacker to obtain full access to the organization´s Database.
Read more…

Uncategorized

The expiry date of viruses

April 19th, 2004
Comments Off on The expiry date of viruses

One of the most infamous computer viruses of all time was the Friday 13 virus. The reason it was given this name is very simple: this is the date when it deleted all the files with an .EXE extension from affected computers.
Read more…

Uncategorized

Web Application Worms: Myth or Reality?

April 13th, 2004
Comments Off on Web Application Worms: Myth or Reality?

This paper discusses the possibility of automated, self-propagating attacks on custom Web application code. It will show that such attacks are not only feasible but that their theoretical success rate is far greater than worms targeting commercial infrastructure. It is the intent of this paper to raise awareness of the threat posed by automated attacks on vulnerabilities that exist in every organization’s Web infrastructure. Threat’s of this type that cannot be avoided by counting on current IPS technologies and the law of large numbers.
Read more…

Uncategorized

Application Security – Next Layer of Protection

April 12th, 2004
Comments Off on Application Security – Next Layer of Protection

Many companies are just now beginning to realize the importance of web application security. Some are learning the hard way. Most veteran security professionals are aware of common Unix applications that have been historically vulnerable such as versions of BIND/DNS, FTP, Sendmail and Apache Web Server.
Read more…

Uncategorized

The Pros & Cons of Ethical Hacking

April 7th, 2004
Comments Off on The Pros & Cons of Ethical Hacking

The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information — or worse.
Read more…

Uncategorized

Building Wireless Community Networks 2/e

April 5th, 2004
Comments Off on Building Wireless Community Networks 2/e

Nowadays, with Wireless enabled computers almost as common as Ethernet, it makes sense to more people and organizations to make the next step and connect their networks using wireless technology. If you or your community is planning to get online using wireless network technology, Flickenger’s book “Building Wireless Community Networks” is exactly where you need to start.
Read more…

Uncategorized