• September 21, 2005 21 Sep'05

    Wingate

    Wingate is a product that allows people on a small home network or a larger business network to share and control access to the Internet through a single computer connection.  Continue Reading

  • September 21, 2005 21 Sep'05

    VBScript

    VBScript is an interpreted script language from Microsoft that is a subset of its Visual Basic programming language designed for interpretation by Web browsers.  Continue Reading

  • September 21, 2005 21 Sep'05

    The threat with the most disaster potential, Part 2

    Whether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions.  Continue Reading

  • September 20, 2005 20 Sep'05

    Cyber crooks going after the desktop

    The antivirus giant's report on threats for the first half of 2005 shows a dramatic increase in the amount of code designed to commit fraud.  Continue Reading

  • September 20, 2005 20 Sep'05

    Invoke the 'classic dialog box' in Windows XP

    Windows XP uses a redesigned Welcome screen login methodology. If you prefer the old method, Microsoft built an emergency function into Windows XP that can help.  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Other resources

    This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, shares resources on buffer overruns and a list of guidelines for securing code.  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Redemption steps

    There is a variety of techniques to help you avoid buffer overruns, and a number of other techniques to reduce the damage it can cause. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security takes a look at how you can improve...  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Example sins

    Buffer overruns are among the most widespread and serious vulnerabilities. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, details a few examples of buffer overruns from the Common Vulnerabilities and Exposures (CVE) ...  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Spotting the sin

    Spotting buffer overruns during code review ranges from being very easy to extremely difficult. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security offers testing techniques for uncovering these code exploits.  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Affected languages

    C is the most common language used to create buffer overruns, closely followed by C++. In this excerpt, the authors of The 19 Deadly Sins of Software Security give advice on how to write cleaner code.  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Extra defensive measures

    Stack protection and non-executable stack and heap are techniques which add an extra layer of defense, however they are not fail proof. This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security reviews these defensive measures ...  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: Overview of the sin

    Buffer overruns have long been recognized as a significant application security problem. Here is a brief overview of this "deadly sin" of software security.  Continue Reading

  • September 19, 2005 19 Sep'05

    Buffer Overruns: The sin explained

    What is a buffer overrun? This excerpt from Chapter 1 of The 19 Deadly Sins of Software Security, defines this "sin" and examines why it is so often exploited.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close