Top:
Publications:
Papers
- Network (In)Security Through IP Packet Filtering
Chapman, D. Brent; 1992; GZip'd Postscript; 46k ``Why packet filtering is a difficult to use and not always secure method of securing a network.
- NFS Tracing by Passive Network Monitoring
Blaze, Matt; 1992; ASCII Text ``Blaze, now famous for cracking the Clipper chip while at Bell Labs, wrote this paper while he was a PhD candidate at Princeton.
- Patch management with GFI LANguard N.S.S. & Microsoft SUS
This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Software Update Services (SUS) to keep your network automatically updated with the latest security patches.
- Protecting your network against email threats
This white paper explains why anti-virus software alone is not enough to protect your organization against the current and future onslaught of email viruses and threats. Examining the different kinds of email attacks and issues that threaten today's organizations, this paper describes the need for a solid server-based email security solution to safeguard your network.
- The COPS Security Checker System
Farmer & Spafford; 1994; GZip'd Postscript; 45k ``The original Usenix paper from 1990 republished by CERT in 1994.
- The corporate threat posed by email Trojans
Describing what Trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of Trojans.
- Why Bayesian filtering is the most effective anti-spam technology
This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
- Why one virus engine is not enough
This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time and therefore the chance of virus infection.
- Why you need an email exploit detection engine
This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.
- With Microscope & Tweezers
Eichin & Rochlis; 1989; GZip'd Postscript.gz; 99k ``An analysis of the Morris Internet Worm of 1988 from MIT's perspective.
[ 1 2 ]
20 Links, Oct 27, 2012
Learn About Linux
This domain could be yours:
Domains for Sale