Categories: "Analysis"

About the Analysis category

  By Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 ... 2 3 4 5 6 7 ...8 ...9 10 11 13

  2005-04-29

Open Source Disk Encryption

  By Hagai Bar-El   , 163 words
Categories: IT Security, Products

About two months ago I was delighted to see the new version of what I consider to be the first open source drive encryption program for Win32. It’s name is TrueCrypt, and it provides functionality that resembles that of DriveCrypt from SecurStar.

Read more »

  2005-02-28

Worms Using Search Engines

  By Hagai Bar-El   , 357 words
Categories: IT Security

Check out this news item:

Latest Mydoom shows hackers using search engines for attacks

It’s about Internet based worms making use of search engines to spread out. In the examples presented the worms search Google, Lycos, etc., for e-mail addresses and for vulnerable machines to hop to using specially-crafted search strings.

I was not aware of this trend of worms before so I agree it’s new. Yet, I don’t agree with any fear associated with this new brand of worms. These worms are somewhat novel in their approach. Yet, I think this approach is better for us (the good guys) rather than worse.

Read more »

1 ... 2 3 4 5 6 7 ...8 ...9 10 11 13


Form is loading...

  XML Feeds

Search

License

All contents are licensed under the Creative Commons Attribution license.