White Papers

View All RSS Feed

Last Updated on 14 Oct. 2015, Total: 1068 White Papers

26 Anti Spam
12 Anti Virus
56 Auditing
60 Auth. & Access Control
3 Content Management
103 Cryptography
12 Disaster Recovery
84 Firewalls & VPN's
6 Forensics
41 Harmless hacking book
1 Honeypots
14 Information Warfare
26 Intrusion Detection
8 Law
3 Managed Security Solutions
109 Misc
24 Mobile Code
32 NCSC&DoD Rainbow series
34 NetWare
33 Network Security
4 Patch Management
3 Phishing
49 Policy & Standards
25 Privacy
21 Software Engineering
2 Trojans
2 Underground
167 Unix Security
48 Web Security
54 Windows Security
6 Wireless Security
  1. Quick Guide for Active Directory Auditing

    The purpose of this free guide is to show system administrators few quick tips on Active Directory change auditing... Read More

  2. How to Audit the 5 Most Important Active Directory Changes

    Active Directory is the central identity store and authentication provider for most networks today making it hugely critical to security... Read More

  3. Why You Need a Next-Generation Firewall

    There are three primary reasons why next-generation firewalls make sense as organizations build and fortify their environments for the future and go beyond looking at IP addresses, ports and protocols for classifying and controlling network traffic... Read More

  4. Data Security Standard and Payment Application Data Security Standard

    Version 3.0 Change Highlights... Read More

  5. The Pharming Guide

    Exploiting well known flaws in DNS services and the way in which host names are resolved to IP addresses, Phishers have upped the ante in the cyber war for control of a customer’s online identity for financial gain. A grouping of attack vectors now referred to as “Pharming”, affects the fundamental way in which a customer’s computer locates and connects... Read More

  6. Tricks of the Spammer's Trade

    Spammer's try to get their messages through spam filters by using trickery. Let’s see how these tricks work, and how up to date filters spot the trickery and use it to their advantage. This article takes a deeper look into what tricks spammer's use to get past bayesian and heuristic filters... Read More

  7. Remote user security: Your IT's Achilles heel?

    Remote working has radically altered employment practices within the new economy, but the benefits (such as employee flexibility and increased productivity) need to be balanced against the problems of managing teleworkers. In particular, companies need to make sure that remote PCs remain properly protected against computer viruses and other security exposures... Read More

  8. Email Compliance

    As if the business needs surrounding email aren’t enough for organizations to manage, there has been a recent surge of government regulations that affect this form of communication. These laws, which affect large and small companies alike in practically every industry, include protecting confidential customer information, corporate governance, law enforcement investigations, and the overall need to ensure that email is... Read More

  9. Attacking the DNS Protocol

    DNS is the most widely used protocol on the Internet yet many security professionals do not have a full understanding of the many weaknesses which surround it which are needed for Penetration Testing and day to day security. In this paper we highlight basic and advanced DNS attacks... Read More

  10. Reducing Corporate Liability With Filtering and Policy Tools

    The overwhelming majority of corporate email addresses today receive unsolicited commercial email, or spam. For a growing number of recipients, this includes spam with adult content or pornography known as unsolicited pornographic email (UPE). UPE poses serious legal risks to corporations, wastes valuable corporate computing resources, and reduces employee productivity... Read More