Off the Wire

Off The Wire Archive

News items for June 2009

Whitepaper - Protecting your network against Web attacks
Learn about web-based threats, the impact to your business, and the most effective solution to implement. [more]
Monday, 29 June 2009, 7:12 AM CET


Whitepaper - How to defend against new botnet attacks
According to Symantec's MessageLabs Intelligence, botnets were responsible for 90% of spam in 2008. More importantly, these compromised "robot" computer networks do not seem to be going away anytime soon. [more]
Thursday, 25 June 2009, 1:54 PM CET


E-mail surveillance renews concerns in congress
The National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged, current and former officials said. [more]
Wednesday, 17 June 2009, 1:26 PM CET


HTTP client fingerprinting using SSL handshake analysis
A cipher suite, in SSL, is a collection of cryptographic techniques that defines a secure communication channel. [more]
Wednesday, 17 June 2009, 12:02 PM CET


50 ways to inject your SQL
Here’s the pseudocode of a routine called “ValidateQuery()”. Its role is to take user input from a .Net application and validate it to remove potential injection. [more]
Wednesday, 17 June 2009, 5:58 AM CET


Whitepaper - The next generation of Web security
Learn how Web Security SaaS can increase overall security effectiveness and identify critical elements that make for lower-cost and easier-to-manage Web security solutions. [more]
Wednesday, 17 June 2009, 5:57 AM CET


Protecting scanning credentials from malicious insiders
This blog entry describes how you can securely audit your Unix and Windows hosts to limit exposing these credentials to an insider and also how to use Metasploit to test any vulnerability scanner to see if it is vulnerable to this type of attack. [more]
Tuesday, 16 June 2009, 10:33 AM CET


Guide - Avoiding 7 common mistakes of IT security compliance
This guide covers seven typical IT security compliance errors and outlines the best practices you can immediately apply to your environment to help your company achieve compliance. [more]
Monday, 15 June 2009, 3:54 PM CET


Apache and SSL: Generating a CSR and self-signed certificate
For this week’s tutorial, I decided to set up a secure web server using Apache on my Windows system. This time, I will be covering generation of the certificate signing request (CSR) and a temporary self-signed certificate. If you would like to try this yourself, make sure that when you download Apache, OpenSSL is included. [more]
Wednesday, 3 June 2009, 1:39 PM CET


Whitepaper - Understanding and using RFID
Read this in depth overview of RFID technology and capabilities, major standards and ways to improve convenience, accuracy, safety and security. [more]
Tuesday, 2 June 2009, 2:12 AM CET


Setting up a load-balanced Oracle Weblogic cluster in Amazon EC2
This article will explain how to set up a basic two-node Weblogic cluster using the 32-bit Weblogic image provided by Oracle with an Amazon Elastic Load Balancer (ELB). [more]
Tuesday, 2 June 2009, 2:07 AM CET


Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //