NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

11.06.2004

 
SSH User Identities

 
Bank accounts in online security scare

Ex-Austin student indicted for data theft

 
WPA Cracker Added to tinyPEAP - Read the White Paper



11.05.2004

 
Microsoft Set to Announce ISA Server (Firewall (Cough)) Flaw on Tuesday

 
Writing Trojans that Bypass Windows XP Service Pack 2 Firewall

 
North Carolina man sentenced to 9 years for spam



11.04.2004

 
Microsoft Loses Browser Market Share to Firefox

 
Source Code Club Strikes Again - PIX OS 6.3.1 Source Code for Sale


 
SING - Send Nasty ICMP Garbage - A Packet Crafting Tool from Tim

 
Duhhh...

Microsoft: Security requires teamwork

 
Internet Exploiter IFRAME Exploit



11.02.2004

 
Is it too late to say vote EARLY and vote OFTEN?

 
Microsoft debates spoofing as security flaw

 
Cisco Security Advisory: Vulnerability in Cisco Secure Access Control Server EAP-TLS Authentication

A Cisco Secure Access Control Server (ACS) that is configured to use Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) to authenticate users to the network will allow access to any user that uses a cryptographically correct certificate as long as the user name is valid. Cryptographically correct means that the certificate is in the appropriate format and contains valid fields. The certificate can be expired, or come from an untrusted Certificate Authority (CA) and still be cryptographically correct.

User authentication is not impacted if EAP-TLS is configured in the Cisco Secure ACS with binary comparison of user certificates as the only comparison method and if the user entry in Lightweight Directory Access Protocol/Active Directory (LDAP/AD) contains only valid certificates.

Cisco Secure ACS for Unix and versions of Cisco Secure ACS for Windows and Cisco Secure ACS Solution Engine prior to, and later than, 3.3.1 are not affected by this vulnerability.

 
Diebold Election System Video (WMV) or Quicktime

 
Crypto Basics - Netware 4 Client Authentication Process



11.01.2004

 
SANS Wednesday Webcast: How to Starve Internet Worms and Viruses Wednesday, November 03 at 1:00 PM EST (1800 UTC)

 
Second Order Code Injection Attacks White Paper from Gunter Ollmann at NGS Software

 
Honeynet Scan of the Month 32 Winners Announced

 
Tomahawk is a command line tool for testing network-based intrusion prevention systems. Here is a white paper on the techniques used by tomahawk.

 
Firewire/IEEE 1394 Considered Harmful to Physical Security

Google plugs hole exposing Gmail mail-boxes

 
E-Voting Flaws Could Give IT Black Eye

 
Hardened-PHP adds security hardening features to PHP to protect your servers on the one hand against a number of well known problems in hastily written PHP scripts and on the other hand against potential unknown vulnerabilities within the engine itself.

 
Linux Administrator's Security Guide

Firewall Piercing HOWTO





This page is powered by Blogger.


Site Meter Locations of visitors to this page